Blog

Abhijeet_Prabhune

Netronome Unveils Draft Specification for Open, Bare Metal SmartNICs at OCP Summit 2017

By Abhijeet Prabhune | Mar 8, 2017

Netronome is at the Open Compute Project (OCP) Summit in Santa Clara this week introducing the Install & Configuration of Open NICs (ICONICS) initiative and a related draft specification. The draft specification provides open guidelines for packaging data plane firmware applications and aims to standardize how the functionality of a bare metal Open NIC (network interface card) installed in COTS and OCP servers can be altered in the field to suit the needs of data center operators. Netronome Agilio CX SmartNICs are now available for use as open, bare metal NICs. The ICONICS initiative, combined with the flexibility of Open NICs, will enable innovative business and efficient operational models.

Danny-Proch-1

Agilio SmartNIC Platforms Showcased at MWC to Deliver High Operational Efficiency for NFVi

By Daniel Proch | Feb 27, 2017

Netronome is at Mobile World Congress in Barcelona this week where are showcasing our Agilio SmartNICs and software integrated with a wide-range of programmable NVFi solutions with our leading partners including Juniper Networks, Affirmed Networks, Mirantis, Nuage Networks from Nokia, and Barefoot Networks. If you’re in town, stop by and visit us in hall 2, booth 2O2MR! We will be demonstrating a variety of use cases of our Agilio SmartNIC platforms and Agilio software with these companies.

Nick-Tausanovitch-9

2017 Prediction: The Move Towards Distributed Security Architectures Accelerates

By Nick Tausanovitch | Jan 17, 2017

The rapid evolution of cloud-based data centers to support virtualized services and containerized applications will accelerate in 2017 and beyond. This will necessitate a move away from traditional data center security architectures, which rely mostly on perimeter-based firewalls, to a more distributed security architecture. This is required because in today’s multi-tenant and multi-group environments, individual applications cannot be trusted, the potential for threat injection inside the data center is real, and the resulting damage can be disastrous.

Sujal Das

Avoid Kernel Bypass in Your Network Infrastructure

By Sujal Das | Jan 10, 2017

Kernel means many things – such as the softer, usually edible part of a nut, or the seed and hard husk of a cereal, or the central and most important part of something. In the world of Linux, the kernel certainly means the central and most important part of the operating system.

Nick-Tausanovitch-8

Virtualization of Mobile Networks Sets the Stage for 5G and IoT

By Nick Tausanovitch | Jan 3, 2017

2017 will be the year that virtualization of mobile networks moves from concept to reality. The benefit of using a cloud-based model to implement network functions, also known as network functions virtualization (NFV), has already been broadly accepted by telecom service providers as a key goal. In fact, the cloudification of mobile networks is a foundational underpinning and key architectural paradigm for 5G and IoT networks and is required to implement functions such as dynamic network slicing, for example.