Best Practices for Performance Tuning of Telco and NFV Workloads in vSphere

Communication Service Providers (CSPs) are looking toward Network Functions Virtualization (NFV) as a means to radically transform their businesses by lowering costs and enabling rapid and agile service innovation. In doing so they aim to reverse the trend of margin erosion driven by the high cost of infrastructure and lack of service differentiation. These trends have long been associated with traditional monolithic and proprietary service platforms.

Spotlight

CyberX Labs

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world's largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioral analytics with proprietary ICS-specific threat intelligence to identity advanced cyberattacks in real-time.

OTHER WHITEPAPERS
news image

Why VDI makes sense forhard-core UNIX® and Linux® engineering applications

whitePaper | December 6, 2022

By now, everyone has heard the terms desktop virtualization and VDI It seems like we’ve been pounded with marketing propaganda about these technologies from companies like VMware, Citrix® and Microsoft® since 2006. But if desktop virtualization is so good, why are most of the world’s desktops still “old-style” physical desktops and laptops?

Read More
news image

vSAN ReadyNode

whitePaper | November 27, 2019

The purpose of this document is to provide VMware® vSAN ReadyNode™ configurations from OEM vendors. vSAN ReadyNode™ is a validated server configuration in a tested, certified hardware form factor for vSAN deployment, jointly recommended by the server OEM and VMware. vSAN ReadyNode™ are ideal as hyper-converged building blocks for larger data center environments looking for automation and a need to customize hardware and software configurations.

Read More
news image

Under the hood of Wslink’s multi layered virtual machine

whitePaper | October 11, 2022

ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities that suggest this is likely to be a tool from a known threat actor; the complete analysis of the malware can be found here.

Read More
news image

Amazon Virtual Private Cloud

whitePaper | April 19, 2022

Amazon Virtual Private Cloud (Amazon VPC) enables you to launch AWS resources into a virtual network that you've defined. This virtual network closely resembles a traditional network that you'd operate in your own data center, with the benefits of using the scalable infrastructure of AWS

Read More
news image

Tanzu Standard with VMware Cloud on Dell EMC

whitePaper | January 26, 2022

VMware Cloud on Dell EMC combines the simplicity and agility of the public cloud with the security and control of on-premises infrastructure delivered as a service to data center and edge locations. It is built upon on the latest VMware software-defined data center suite, including industry-leading compute, storage, and network virtualization that is optimized for Dell EMC VxRail hyperconverged infrastructure. It’s quick and easy to procure and delivers a cloud-style consumption model for a range of use cases.

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | March 28, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More

Spotlight

CyberX Labs

CyberX provides the most widely deployed cybersecurity platform for continuously reducing risk to critical industrial infrastructures. Deployed in the world's largest environments and backed by military-grade cyber experts from the IDF, the CyberX platform uniquely combines M2M behavioral analytics with proprietary ICS-specific threat intelligence to identity advanced cyberattacks in real-time.

Events