Remove Firewall Remove Hardware Remove Load Balancer Remove Security
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare’s OCP NIC is the most comprehensive 10GbE solution for ultra-scale environments requiring low latency and jitter, enhanced small packet performance, Telemetry and Security. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). The SFN8722 has 8 lanes of PCle 3.1

Software 194
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare’s OCP NIC is the most comprehensive 10GbE solution for ultra-scale environments requiring low latency and jitter, enhanced small packet performance, Telemetry and Security. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). The SFN8722 has 8 lanes of PCle 3.1

Software 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. Servers/Hardware. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. I hope this collection of links has something useful for you! Networking.

article thumbnail

Technology Short Take 143

Scott Lowe

Here’s a quick look at using Envoy as a load balancer in Kubernetes. Servers/Hardware. I saw this blog post about Curiefense , an open source Envoy extension to add WAF (web application firewall) functionality to Envoy. I hope this collection of links has something useful for you! Networking.

article thumbnail

Managing What Matters In the Cloud: The Apps » Data Center.

Data Center Knowledge

The user level elements that are managed within such an IaaS cloud are virtual servers, cloud storage and shared resources such as load balancers and firewalls. Security policies. Firewall rules. Managing the cloud stack itself is typically done through the vendor-provided UIs, and augmented by 3rd party tools.

article thumbnail

Technology Short Take #48

Scott Lowe

Tom’s key point is that disaggregating software from hardware—which is kind of a given if you’re buying whitebox networking gear—gives you the (potential) flexibility to repurpose network gear based on the software running on it. Servers/Hardware. However, it’s at least possible with whitebox networking gear.