The NW Toolkit for SDN

  With the advent of programmable NW concept, the possibilities of innovation within the NW has increased manifold. However, that also brings up a challenge of revamping the existing toolsets like NW Monitoring, Firewall, etc. Another critical area for SDN...
read more

Out of the ‘Blue Cloud’: Top Cloud Stories 2014

This year, Cloud Security joined mainstream cloud conversations. Cloud storage generated many of the year’s top news stories; from advanced technology announcements to market changing acquisitions. Here are the Top-3 stories that we feel have shaped-up Cloud in 2014. Why...
Out of the ‘Blue Cloud’: Top Cloud Stories 2014
read more

SDN – Its Security is Inevitable!

It’s time to drive the SDN wagon further ahead! In the past, we have touched upon aspects that define SDN, understood the “openflow” connection found out what would the future of this market will be like. The basic concept of...
read more

SDDC: Extending Virtualization Concepts

SDDC is the abbreviation for Software-Defined Data Center. SDDC is a concept wherein eventually all elements – compute, networking and storage systems in the data center will be controlled through a management layer that is not dependent on the hardware...
read more

Why SMB3 NAS?

Microsoft has been investing quite seriously in the Network Attached Storage (NAS) protocol SMB 3. This clearly states that NAS is the way ahead. This post summarizes the basics about SMB3 NAS and the compelling features that have made it...
read more

Security Holes – Part 2

In Part-1 of this post we spoke about security holes and 2 sources of vulnerabilities: Buffer Overflow and SQL Injection. We will cover next 3 sources in this post. Integer Overflow Integer overflow is the result of an attempt by...
Security Holes – Part 2
read more

Security Holes – Part 1

Technically, ‘Vulnerability’ is a cyber-security term that refers to a flaw in a system that can leave it open to attacks. In terms of computing, a resource (either physical or logical) may have one or more vulnerabilities that can be...
read more

Technical Deep Dive: LSM and SELinux Internal Structure

LSM Module: OS Security is a chronic and growing problem: as more systems (and more money) go on line, the motivation to attack rises. Linux is not immune to this either. Hence was introduced LSM that provides a general kernel...
read more

OpenStack Grizzly – 4 Key Facets

OpenStack came up with its new release called ‘OpenStack Grizzly’ earlier this April. This release is seventh in the row and is driven by users who have been running OpenStack in production for the past year and have asked for...
read more

Open Stack: A Sneak-peek

Founded by Rackspace Hosting and NASA, OpenStack is used for building massively scalable private and public clouds. OpenStack can also be referred to as a global collaboration of cloud computing experts producing the global open source platform for public and...
read more
1 3 4 5