Cisco Application Centric Infrastructure Design Guide

April 10, 2019

Cisco Application Centric Infrastructure (Cisco ACI™) technology enables you to integrate virtual and physical workloads in a programmable, multihypervisor fabric to build a multiservice or cloud data center. The Cisco ACI fabric consists of discrete components that operate as routers and switches, but it is provisioned and monitored as a single entity.

Spotlight

IOActive, Inc.

IOActive is the only security consultancy with a global presence and deep expertise in hardware, software, and wetware assessments. Our mission is to make certain your enterprise is more secure in an era of pervasive and emerging threats.

OTHER WHITEPAPERS
news image

Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

whitePaper | January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Read More
news image

Dell EMC VxRail vSAN Stretched-Cluster Planning Guide

whitePaper | November 20, 2019

vCenter Server is the centralized platform for managing a VMware environment. It is the primary point of management for both server virtualization and vSAN and is the enabling technology for advanced capabilities such as vMotion, Distributed Resource Scheduler (DRS) and HA. vCenter scales to enterprise levels where a single vCenter can support up to 1000 hosts (VxRail nodes) and 10,000 virtual machines. vCenter supports a logical hierarchy of datacenters, clusters, and hosts, which allow resources to be segregated by use cases or lines of business and allow resources to be moved as needed dynamically. This is all done from a single interface.

Read More
news image

SD-WAN Foundations for aSuccessful SASE Implementation

whitePaper | October 31, 2022

Secure access service edge (SASE) is a concept initiated by analyst research firm Gartner Inc. in 2019 as part of the technology “hype cycle.” Recently, SASE has been embraced by the customer and vendor community more readily to solve a variety of modern networking and security challenges.

Read More
news image

Cloud-native 5G –Getting Started

whitePaper | February 28, 2023

As they deploy 5G, telecoms operators around the world are experimenting with cloud¬native core networks, which offer greater flexibility, scalability and automation than conventional telecoms networks. This paper explores how telecoms operators could go about implementing a cloud¬native 5G core network. Most early movers are taking one of two approaches to deploy a cloud¬native 5G core:

Read More
news image

Fixed 5th Generation Advanced and Beyond

whitePaper | November 8, 2022

Dr. Effenberger has worked in the optical access field at Bellcore, Quantum Bridge Communications (Motorola), and Futurewei Technologies, where he is now the Fellow for fixed access network technology. His team works on forward-looking fibre access technologies, with several “world’s first” prototypes and trials. Frank is the rapporteur for ITU-T Q2/15, vice chair of ETSI F5G ISG, is a Fellow of the OSA and the IEEE, and holds 135 US patents.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 3, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. The following trends are making organizations reassess their approach to security:

Read More

Spotlight

IOActive, Inc.

IOActive is the only security consultancy with a global presence and deep expertise in hardware, software, and wetware assessments. Our mission is to make certain your enterprise is more secure in an era of pervasive and emerging threats.

Events