This article provides a snapshot of some of the software-enabling collateral available for the Cache Allocation Technology (CAT) feature.
This article provides a number of Memory Bandwidth Monitoring (MBM) example proof points and discussion fitting with the usage models described in previous articles.
This article describes software support available for the Memory Bandwidth Monitoring (MBM) feature. Prior blogs in this series have included an overview of the MBM feature and architecture and usage models, and detailed examples of proof points.
This article presents a firewall for OpenStack’s Neutron project that is based entirely on Open vSwitch rules. The firewall is based on "learn action" and uses the same public API to talk to the Neutron agent as the existing Linux Bridge firewall implementation, making it a straight swap for people already using OVS.
The networking world is rife with buzz words like SDN, NFVs, Cloud, and Virtualized everything for network switches, routers, firewalls, load balancers, web servers, and other communication functions. Commodity NICs can replace expensive, specialized hardware devices for much less cost and can easily be reconfigured as requirements change. When you are ready for SDN/NFV, where to start, what to...