Remove Hardware Remove Load Balancer Remove Operating Systems Remove Strategy
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 194
article thumbnail

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

This is the industry’s first universal kernel bypass (UKB) solution which includes three techniques for kernel bypass: a POSIX (Portable Operating System Interface) sockets-based API (Application Program Interface), TCP (Transmission Control Protocol) Direct and DPDK (Data Plane Development Kit). Hardware Based Security (ServerLock).

Software 151
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 153

Scott Lowe

Xavier Avrillier walks readers through using Antrea (a Kubernetes CNI built on top of Open vSwitch—a topic I’ve touched on a time or two) to provide on-premise load balancing in Kubernetes. Servers/Hardware. Cabling is hardware, right? Operating Systems/Applications. Career/Soft Skills.

Linux 74
article thumbnail

Technology Short Take 144

Scott Lowe

Servers/Hardware. Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. I thought it was useful, so now I’m sharing it with you. Plastic microchips ? That’s kind of cool.

Linux 90
article thumbnail

Technology Short Take 144

Scott Lowe

Servers/Hardware. Teri Radichel uses some basketball analogies to explain why defensive (proactive) security strategies are more desirable than reactive security strategies. Operating Systems/Applications. I thought it was useful, so now I’m sharing it with you. Plastic microchips ? That’s kind of cool.

Linux 60
article thumbnail

CIOs Need To Realize That Virtualization Isn't All That It's Cracked Up To Be (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

This low level software allowed multiple applications to run on the same physical hardware but believe that they had the box all to themselves. Things like what operating system an application used no longer mattered – you could mix and match to your heart’s content. No related posts.