This is the first post in a performance resilience blog series, shedding light on common data center performance issues and possible solutions. First chapter looks at the issue of duplicate traffic in misconfigured environments – and considers the benefits of adding deduplication via a SmartNIC.
When you stop to think about it, the entire IT industry is driven by the premise that Moore’s law will continue to provide double the number of transistors per square inch every 18 months and thereby help us to keep up with the relentless growth in data to be processed. What happens when this is no longer true?
The final in the 3-part series of articles by Dan Joe, where he explores the various stages of reconfigurable computing.
The second in the 3-part series of articles by Dan Joe, where he explores the various stages of reconfigurable computing.
The first in the 3-part series of articles by Dan Joe, where he explores the various stages of reconfigurable computing.
In the run-up to SDN World Congress in The Hague, it is interesting to note that it was at this very show in Dusseldorf 5 years ago that the original NFV whitepaper was first presented. How time flies!
In the world of fin tech, data capture has never exactly been the sexiest area of development.
But as market participants ready themselves for a new wave of trading rules, and as competition among cutting edge trading firms has shown no sign of abating, the importance of data capture has taken on much greater significance.
At Mobile World Congress recently, I was privileged to be invited to speak on a panel debating NFV. The topic of the panel discussion was “NFV: a re-examination” and included participants from Telefonica, InterDigital Europe, Cisco, Spirent and Red Hat.
Pokemon Go has taken the world by storm. Nintendo have done it again. Just like the Nintendo Wii changed video game players from couch potatoes into physically active game participants...
Security prevention has been the predominant philosophy guiding security solutions to date. The premise is that it is possible through defense in depth and multiple layers of security to foil attacks...