Smarter
Data Delivery

Networking Industry experts discuss the latest in Big Data, IoT, SDN and NFV

Home >> Smarterdatadelivery
Michael Lilja -

DPDK Packet Capture (pdump)

The 16.07 release of DPDK introduces a new packet capture framework, which will allow users to capture traffic from existing devices/ports/queues and dump the packets to a pcap file. I decided to take a closer look at DPDK and the new pdump framework to see how it would leverage a packet capture/analysis environment using an XL710 NIC. I would also like to give a very high-level introduction to DPDK because in the circles that I circulate, people are really aware of what DPDK is and what it can do.

Read more ...
Alex Omø Agerholm -

Hardware acceleration in the cloud - why not?

 

Uniformity scales

Data processing and computing power are these days moving into the cloud, which is mainly a virtualized environment with huge flexibility and scalability achieved through a massive infrastructure, based on uniform computing platforms working in parallel. This means that the cloud utilizes same servers all over – standard server platforms stacked in huge numbers. It scales fantastically as you can simply add more servers to the pile to make more computing power available.

 

Read more ...
Guest Blogger -

SIEM Thing, Different Day

The uptake of Security Information and Event Management (SIEM) technology in large enterprises is nearly ubiquitous. Today, there are very few large companies without a SIEM, and in fact most find themselves with multiple SIEM implementations, gained through mergers/acquisitions or organizational fractures.

However, what is often less established is a plan to capitalize on SIEM technology, amazing since the SIEM solution has likely taken months to implement and has cost a fortune.

Read more ...
Peter Ekner -

Packet capture for cyber security

As network needs of organizations grow, so does the consequent amount of data. But with this growth also comes the heightened risk of coming under cyber attacks. In the case of a cyber breach or attack, it is essential for IT security personnel to take necessary steps to mitigate the problem, as soon as possible. With this article, Peter sheds light on the importance of packet capture for combatting cybercrime.

Read more ...
Dan Joe Barry -

The Pokemon Go Effect

While we are still questioning the social and societal effects of the Pokemon Go app, there is one aspect which leaves no doubt in everyone's mind. The phenomenon of augmented and virtual reality is definitely here to stay. But in all this frenzy have network carriers or service providers stopped to consider the strain that will be put on networks and data flow? With his latest blog entry, Dan Joe Barry raises some key questions on this topic.

Read more ...
Claus Ek -

History of Ethernet - New "Rules" and The Ongoing Evolution

Ethernet has come a long way since its introduction in the 1970s. With this blog , Claus explains how this technology has evolved over the years and gives us a glimpse into some of the ethernet trends that we can expect in the near future.

Read more ...
Alex Omø Agerholm -

The IoT is hitting us

The IoT phenomenon is happening as we speak. What is IoT? It’s simple, all the new things we buy can be “connected”. Your smartphone, tablet, computer, etc., can all be connected over the home Wi-fi or through the mobile network. But as more and more gadgets get connected to the network, the amount of data generated from each device also increases. So what can we do with all this new data that is generated? Do we really need it? And if so, for what purpose?

Read more ...
Michael Lilja -

Go Open Source Or Be Left Behind

Open source has been the buzz word for many organizations in the technology industry. But what exactly is open source and when do businesses become open source? Find out from this week's blog article by Michael Lilja.

Read more ...
Sven Olav Lund -

PCI Express Bifurcation in the 100G Era

In this week's blog entry, Sven Olav goes deeper into the discussion on 100G monitoring solutions by addressing the challenges involved in using a PCIe interface.

Read more ...
Dan Joe Barry -

Security Prevention Alone Is Not Enough

The Maginot Line was once considered a work of genius, but, after the Second World War, became the butt of many jokes, such as the Maginot Line is French for “speed bump ahead”. If you don’t want your network security to become a joke, then invest in security detection, continuous monitoring and automated tools for correlation of data alerts.

Read more ...