Accelerated Firewall Software on DPDK-ready x86 Hardware Platforms

high performance software x86 packet processing

Virtualization has massively evolved cloud computing and computer networking, with VNF’s now available and sufficient for many network functions previously performed through dedicated hardware. Yet even today, achieving the near real-time performance expected of networking hardware is a still challenge for virtualized network functions typically running on open compute x86-based network hardware. Firewalls and intrusion …

Read more

Accelerated Firewall Software on DPDK-ready x86 Hardware Platforms was last modified: July 27th, 2020 by James Piedra

3 devices set to evolve with edge computing

smartphones, drones and virtual/augmented reality evolve with mobile edge computing

  When it comes to technology, its no secret batteries have always lagged behind and held back mobile capabilities. Even today Li-Ion and Li-Polymer (the two most used battery technologies) have to make trade-offs between capacity, charging/discharging speed, cost and lifespan. As transistors components and chips have shrunk year over year, batteries have only really …

Read more

3 devices set to evolve with edge computing was last modified: June 10th, 2021 by James Piedra

Lanner Ready to Offer LTE Certified, FirstNet-Ready Wireless Gateways

FirstNet Next-gen emergency communications network. hardware platforms for critical communications and services.

The evolution of emergency services is now spearheaded by this year’s deployment of a nation-wide public-safety dedicated network known as FirstNet. This critical network reserves 20Mhz out of the valuable 700 Mhz frequency range due to the obstacle penetrating power this frequency affords. FirstNet was developed to provide mission critical communications and emergency services the …

Read more

Lanner Ready to Offer LTE Certified, FirstNet-Ready Wireless Gateways was last modified: February 26th, 2019 by James Piedra

What is SD-WAN and Why you need it

SD-WAN connectivity, uCPE on premises SD-WAN

Software-defined Wide Area Networks are the next evolution to VPN’s (Virtual Private Networks) now providing highly flexible, automated and resilient data transport for businesses. A useful analogy to understand SD-WAN is where VPN’s are like manual gearboxes in a car; SD-WAN is an automatic radar-guided cruise-control solution. Both can achieve the same result: connectivity between …

Read more

What is SD-WAN and Why you need it was last modified: April 2nd, 2020 by James Piedra

Why Multi-Access Edge Computing is the future

Most modern devices, applications and services make extensive use of cloud computing resources (data centers, CDN’s). Nearly all hardware leveraged in cloud computing is composed primarily of: CPU’s, GPU’s, RAM, Network interfaces and non-volatile storage; all of these are the essential building blocks of modern cloud computing. But there’s much more to computing, especially networks, …

Read more

Why Multi-Access Edge Computing is the future was last modified: April 2nd, 2020 by James Piedra

4 frightening attacks insecure IoT devices can enable today

Internet of Things powered Distributed Denial of Service Attacks cripple critical internet Domain Name Servers

The internet is abuzz with exciting innovations in technology, its minimization, automation capacity and the myriad re-applications of older technologies now enhanced with modern communications advances. But this comes with significant security concerns, as now most of our devices, appliances and even light-bulbs are becoming internet-facing liabilities. Cars, pacemakers, heart-monitors, webcams, smartphones, GPS and wireless …

Read more

4 frightening attacks insecure IoT devices can enable today was last modified: February 11th, 2019 by James Piedra

How to find a Secure, Reliable & Trusted Hardware Vendor, OEM/ODM.

Compromised server boards, system management chips and backdoors

News reports and the several ongoing investigations of alleged hardware backdoors/vulnerabilities found in several mass-produced computer hardware suppliers leave many security professionals increasingly concerned about their hardware. According to US intelligence, it has become incredibly difficult, if not impossible in practice, to effectively audit modern computer hardware that may have been tampered with – even …

Read more

How to find a Secure, Reliable & Trusted Hardware Vendor, OEM/ODM. was last modified: February 11th, 2019 by James Piedra

Rise in HTTPS Phishing Attacks and What It Means for Your Cyber Security

Over this year alone there has been a huge push for websites to enable secure communications over the internet through the adoption of HTTPS. This has amounted in a not insignificant increase in the number of websites using HTTPS as, according to statistics from Let’s Encrypt, 65% of the webpages that were loaded by the …

Read more

Rise in HTTPS Phishing Attacks and What It Means for Your Cyber Security was last modified: January 30th, 2018 by Rick Spencer

Why you can’t ignore NBAD in your Cyber Security Strategy

NBAD Systems

We all agree that the tools and techniques of malicious online hackers have evolved and advanced alongside the technologies that enable them, making it essential that network administrators ensure their networks are prepared for any eventuality. This is where Network Behavior Anomaly Detection (NBAD) systems come into the picture. In this post, we will review …

Read more

Why you can’t ignore NBAD in your Cyber Security Strategy was last modified: January 30th, 2018 by Rick Spencer

10 Cyber Security Predictions for 2018 – Is your IT/OT Network Ready?

There are so many predictions for 2018 when it comes to cyber security. Gathering them all would make an endless list. So let’s focus on the ones that are more likely to happen. GDPR will be effective in May 25th in the European Union. Programmers and engineers are working on developing ways to stop or …

Read more

10 Cyber Security Predictions for 2018 – Is your IT/OT Network Ready? was last modified: May 30th, 2018 by Rick Spencer