Over the past few decades we have seen great advancements in the IT industry. In fact, the industry itself seems to be growing at an increasingly faster pace. However, as the industry grows so to does its evil twin – the figurative sum of all threats to IT security.
On the bright side, along with a steady stream of ever-evolving security issues and threats, there has also been a great effort to mitigate and, when possible, entirely eliminate such threats. This is accomplished by either fixing the bugs that allowed these issues and threats to exist (in the first place) or by fixing the configurations and protectionary mechanisms of systems so as to prevent attackers from finding success.
As 2015 has been no stranger to news stories about data leakages, various security flaws, and new types of malware – one could easily conclude that “the dark side” is winning this seemingly eternal race.
However, taking the complexity of today’s IT solutions into account
Continue reading “Configuring and Applying SCAP Policies During Installation”
The ocean of data coursing through your business can be a blessing or a curse.
If you can use your data to spot opportunities as they appear, it can mean the difference between success and failure. Unfortunately for many companies, key performance indicators and other metrics reporting can involve long waits due to complex legacy systems burdened by large data volumes. The result can be standard reports that take hours or even days—and an inability to deliver custom reports.
How do these companies compensate for slow, inflexible reporting systems? Many end up relying on spreadsheets and manual labor to consolidate information from disparate systems. Is this timely or an efficient use of company manpower? Usually not.
In today’s 24/7, digital world, real-time analytics
Continue reading “Business Intelligence for the Real-Time Enterprise”
The Linux networking stack has many features that are essential for IoT (Internet of Things) and data center networking, such as filtering, connection tracking, memory management, VLANs, overlay, and process isolation. These features come with a small overhead of latency and throughput for tiny packets at line rate.
DPDK (Data Plane Development Kit) allows access to the hardware directly from applications, bypassing the Linux networking stack. This reduces latency and allows more packets to be processed. However, many features that Linux provides are not available with DPDK.
What if there was a way to have ultra low latency and high throughput for some traffic, and full feature-set from Linux networking, all at the same time? This “utopia” is now possible with Queue Splitting (Bifurcated Driver).
Continue reading “Getting the Best of Both Worlds with Queue Splitting (Bifurcated Driver)”