SSDs and Application Performance: What’s the connect?
Before I even start getting into the details of SSD and application performance, a foreword about what is the intent behind writing this post. This post will…
5 Key Features Of Great Software Development
It is a world of difference between a truly effective software development and routine. Development of customized software is one of the main ways in which companies…
SDN Controller Performance Challenges – 2
In a typical data center, approx. 100k per second is the median flow arrival rate. And worst case estimates are 10M flow arrivals per second. With the…
SDN Controller Performance Challenges – 1
In our earlier blog, you learned about the basics of SDN as well as its growing market opportunities.But one factor that can falter the SDN promise is…
Security Holes – Part 2
In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in…
Security Holes – Part 1
Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource…
Virtual Machine Archival APIs
Introduction of Virtual Machines (VMs) has wiped out the mandatory cap on the rate at which the server trail grew. However this led to the problem of…
2014: Top Storage Technology Advancements to Watch Out
We hand-picked top storage technologies that are ready to take their place and have an impact on your data center in 2014. Flash Storage: Now a Mainstream. The…
Open vSwitch – A Quick read.
By definition, Open vSwitch is open-source virtual switch software designed for virtual servers. It is a production quality, multilayer virtual switch licensed under the open source Apache…
Technical Deep Dive: LSM and SELinux Internal Structure
LSM Module: OS Security is a chronic and growing problem: as more systems (and more money) go on line, the motivation to attack rises. Linux is not…