Calsoft Attends VMworld 2014

VMworld 2014 San Francisco once again exceeds and sets higher benchmark for hosting successful technology event. The event truly lived upon its theme of endless opportunities. Technology think tank and business heads of Calsoft attended the event and found the...
read more

SDDC: Extending Virtualization Concepts

SDDC is the abbreviation for Software-Defined Data Center. SDDC is a concept wherein eventually all elements – compute, networking and storage systems in the data center will be controlled through a management layer that is not dependent on the hardware...
read more

Why SMB3 NAS?

Microsoft has been investing quite seriously in the Network Attached Storage (NAS) protocol SMB 3. This clearly states that NAS is the way ahead. This post summarizes the basics about SMB3 NAS and the compelling features that have made it...
read more

SSDs and Application Performance: What’s the connect?

Before I even start getting into the details of SSD and application performance, a foreword about what is the intent behind writing this post. This post will mostly run you through understanding of performance problems in data center that use...
read more

5 Key Features Of Great Software Development

It is a world of difference between a truly effective software development and routine. Development of customized software is one of the main ways in which companies can improve their business processes and ensure that their performance is a growth-oriented...
read more

SDN Controller Performance Challenges – 2

In a typical data center, approx. 100k per second is the median flow arrival rate. And worst case estimates are 10M flow arrivals per second. With the great ongoing digital explosion, there are no surprises that these estimates would be...
read more

SDN Controller Performance Challenges – 1

In our earlier blog, you learned about the basics of SDN as well as its growing market opportunities.But one factor that can falter the SDN promise is its performance in comparison with existing technologies. Let’s try & understand this a...
read more

Security Holes – Part 2

In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in this post. Integer Overflow Integer overflow is the result of an attempt by...
Security Holes – Part 2
read more

Security Holes – Part 1

Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource (either physical or logical) may have one or more vulnerabilities that can be...
read more

Virtual Machine Archival APIs

Introduction of Virtual Machines (VMs) has wiped out the mandatory cap on the rate at which the server trail grew. However this led to the problem of VM sprawl, which essentially means persistent deployment and growth of virtual machines, some...
Virtual Machine Archival APIs
read more