Storage Informer
Storage Informer

Archive for October, 2009

Cloud Computing, Virtualization and Open Source on Intel

by on Oct.19, 2009, under Storage

Cloud Computing, Virtualization and Open Source on Intel

In an earlier post, I mentioned that the Open Source at Intel website was going to have several focused topics about the intersection of Cloud Computing, Virtualization and Open Source. I wanted to highlight a few of those new topics here in this blog post.

Cloud Computing Spotlight: Virtualization&aposs Next Frontier

"Because of its strengths in collaborative, standards-based innovation, Open Source software holds great promise for moving the cloud forward. Building on the foundations of mature hypervisor technologies such as those in Xen* and KVM*, open Cloud Computing infrastructures will advance the ecosystem as a whole." Read more …

Project Spotlight: Xen and KVM Enablement for Trusted Computing

"The security of Cloud Computing is vital to end customers as they consider placing their data on public infrastructure. They need to be assured of a trusted environment, even as they share hardware with other organizations, cede administrative control to the cloud operator, and comingle data and applications of multiple security levels. Current work by Intel within the Xen* and KVM* projects is helping to advance that goal through a mixture of hardware and Open Source software technologies." Read more …

Ecosystem Spotlight on Virtualization

"Nowhere do the benefits of Open Source seem more compelling than in the burgeoning Cloud Computing space, where virtualization and advanced technologies create bright opportunities for innovative companies. To explore the enterprise perspectives on public and private clouds, Intel invited a panel of notable experts from Cisco, Citrix, Microsoft, Sun Microsystems, and VMware to share their viewpoints at the Intel Developer Forum 2009." Read more …

Content Spotlight: Security in a Virtualized Environment Whitepaper

"As with any major change to an organization’s IT architecture, virtualization brings with it a number of new security challenges and considerations. The hardware and software ecosystem continually introduces new measures to help address these challenges. The security outlook around virtualization continues to unfold, including the following key changes to the physical security model." Read more …

Intel Expert Series: Billy Cox and Jun Nakajima

"Billy Cox is particularly involved in the development of strategic relationships between Intel and hypervisor projects, especially Xen* and KVM,* as well as cloud platforms such as the Eucalyptus project. Among his key goals are enabling trusted multi-tenancy in Cloud Computing environments." Read more …

"Jun Nakajima is a Principal Engineer at the Intel® Open Source Technology Center who focuses on Open Source virtualization projects, such as Xen and KVM. In fact, Jun wrote the first code for Xen to take advantage of Intel® Virtualization Technology (Intel® VT) and continues to be recognized as one of the key contributors to Xen." Read more …

Platform Technology Spotlight

"In the application virtualization space, many Citrix customers are looking to simplify their environments by virtualizing their Citrix XenApp* servers on Citrix XenServer*. Citrix recently benchmarked its XenApp 5.0 application virtualization solution with new XenServer 5.5 on the Intel® Xeon® processor 5500 series and demonstrated dramatic performance benefits, compounded by the use of Intel® Hyper-Threading Technology." Read more …

You can visit the Open Source at Intel website for more information on open source at Intel.

URL: http://feedproxy.google.com/~r/IntelBlogs/~3/zOwshLTwLBM/

Leave a Comment :, , , , , , , , , , , , , , , , , , , , , , , more...

Transport Layer Security – a novel approach

by on Oct.19, 2009, under Storage

Transport Layer Security – a novel approach

Transport Layer Security (TLS) is widely used in Secure Internet communication, especially for securing Web / HTTP traffic. TLS is a replacement for the Secure Sockets Layer (SSL) protocol, which provides similar protections. TLS provides cryptographic services to application traffic payloads in the form of data authenticity and optionally data confidentiality. Each pairwise (P2P) secure session maintains independent cryptographic state for that session, which can aggregate to a large amount of state held on TLS terminators / servers, when millions of TLS connections are terminating at the same destination or domain (e.g. ecommerce / banks / eBay /etc.). Furthermore because TLS operates at the application layer, all cryptographic operations are performed on large application buffers, which require reassembly of all network packet fragments before operating on that buffer. This results in the need to provision expensive TLS aggregators at the front of each domain providing secure web communications and the solution does not scale well with increase in demand.

In this video, researchers from Intel Labs demonstrate a novel approach for providing a cryptographic scale free TLS solution, which can scale with increase demand. This is achieved by using a cryptographic key derivation technique, where using a ‘master key’ and some identifiers located in the packet, we can dynamically compute unique session keys on a per packet basis, instead of storing individual session keys for each and every session. The technique essentially trades compute for storage, thus allowing a larger number of TLS connections to be supported to a given server / domain. Furthermore, by providing the cryptographic operations on a per-network-packet basis (instead of operating on application payload buffers), it allows early validation of data integrity, allowing bad packets to be rejected without having to wait until the application buffer is reconstructed and applying the crypto operations / buffer validation at a later stage of the network pipeline.

Comments (0)

URL: http://feedproxy.google.com/~r/IntelBlogs/~3/t6D-y-iJxpc/transport_layer_security_-_a_n.php

Leave a Comment :, , , , , , , , , , , , , more...

Riverbed Strengthens Technology Leadership in WAN Optimization with New Release of RiOS Software for Steelhead Appliances

by on Oct.18, 2009, under Storage

Riverbed Strengthens Technology Leadership in WAN Optimization with New Release of RiOS Software for Steelhead Appliances

Riverbed Technology (NASDAQ: RVBD), the IT infrastructure performance company for networks, applications and storage, today announced the upcoming release of version 6.0 of the Riverbed Optimization System (RiOS), which powers Riverbed’s award-winning WAN optimization solutions. With RiOS 6.0, Riverbed continues to deliver industry-leading performance for the broadest range of applications and platforms being used in today’s distributed IT and cloud infrastructure environments. Riverbed continues to enable organizations to support more users on more platforms, with RiOS 6.0 featuring new and improved support for Citrix XenApp, Mac clients, Oracle E-Business Suite 12 and many web applications, such as Microsoft SharePoint and SAP. In addition, Riverbed is building upon its lead in delivering solutions to enhance disaster recovery (DR) scalability with new features and higher performance for data center-to-data center replication. This enhanced version of Riverbed WAN optim ization is the most comprehensive to date, providing organizations the best approach for their distributed IT and private cloud infrastructures. Full Story…

URL: http://www.riverbed.com/company/news/press_releases/press_101909b.php

Leave a Comment :, , , , , , , , , , , , , , , more...

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Visit our friends!

A few highly recommended friends...