Network Infrastructure

Accelerating High-Speed Networking with Intel® I/O Acceleration Technology

January 1, 2023

intel
The emergence of multi-Gigabit Ethernet allows data centers to adapt to the increasing bandwidth requirements of enterprise IT. To take full advantage of this network capacity, data center managers must consider the impact of hightraffic volume on server resources. A compelling way of efficiently translating high bandwidth into increased throughput and enhanced quality of service is to take advantage of Intel® I/O Acceleration Technology (Intel® I/OAT), now available in the new Dual-Core and Quad-Core Intel® Xeon® processor-based server platforms. Intel I/OAT moves data more efficiently through these servers for fast, scalable, and reliable networking.

Spotlight

Vectra Networks, Inc.

Vectra® Networks automates the hunt for hidden cyber attacks inside campus networks, data centers and the cloud by continuously monitoring internal traffic to detect threats as they unfold.

OTHER WHITEPAPERS
news image

Providing Enhanced GTP Security in Mobile Networks

whitePaper | April 11, 2022

The constantly evolving attack techniques used by different threat actors demand extensive and advanced detection and protection. Comprehensive signaling firewall solutions are needed to secure the vulnerable roaming connections of the 2G/3G and 4G/LTE mobile networks, as well as in 5G non-standalone (NSA) roaming scenarios.

Read More
news image

Impact of 5G on 4G Services for Operators and NEMs

whitePaper | March 1, 2020

5G is gathering momentum at a pace not experienced with legacy technologies such as 3G and 4G. In fact, a growing number of operators that have existing LTE networks have now launched 5G, according to the GSA. We’ve already seen a great deal of investment in 5G, and we’ll see a growing number of operators targeting the enterprise market to support applications in agriculture, manufacturing, automotive and healthcare. It is anticipated that an acceleration of 5G roll-out will take place throughout 2020, particularly with non-standalone (NSA) designed to work with existing 4G networks.

Read More
news image

China Telecom Helps Unleash the Power of 5G

whitePaper | June 20, 2022

5G HAS FINALLY BECOME AVAIL ABLE. COMPARED TO 4G, 5G CAN DECREASE latency tenfold, increase throughput tenfold, and boost trac capacity by 100 times. More important than 5G technology itself for telecom carriers and service providers, however, are the wealth of capabilities enabled by 5G.

Read More
news image

How To Achieve Secured Wired and Wireless Networks

whitePaper | May 1, 2022

The access layer offers the broadest attack surface in an enterprise’s network. It supports all network connectivity (via both wired Ethernet switches and wireless access points) for employees, contractors, and guests—as well as Internet-ofThings (IoT) devices. With ever-increasing numbers of devices connecting to networks each day, ensuring access layer security becomes a critical need. And with remote working becoming a new standard during the COVID-19 pandemic (and even beyond), proper security to mitigate access layer attacks has never been more important.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | October 10, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security.

Read More
news image

ARIADNE – On communication-theoretic models for programmable wireless environments enabled by reconfigurable intelligent surfaces

whitePaper | June 2, 2021

With the current deployment of the fifth generation (5G) of communication systems, it is now a critical time to identify enabling technologies for the sixth generation (6G) of communication systems. 6G systems are expected to fulfill more stringent requirements than 5G systems, on transmission capacity, reliability, latency, coverage, energy consumption, and connection density.

Read More

Spotlight

Vectra Networks, Inc.

Vectra® Networks automates the hunt for hidden cyber attacks inside campus networks, data centers and the cloud by continuously monitoring internal traffic to detect threats as they unfold.

Events