DXTP GPU, and advanced graphics and compute acceleration for power constrained devices
Learning from the Next-Gen Firewall
Ron Wilson, Intel FPGA
September 13, 2017
Torrents of packets will cascade into the data center: endless streams of data from the Internet of Things (IoT), massive flows of cellular network traffic into virtualized network functions, bursts of input to Web applications. And hidden in the cascades, far darker bits try to slip through: cyber attacks. They may seek to interfere with applications, steal private data, recruit servers into bot nets, infect data-center clients, encrypt and ransom vital files, or even do physical harm over the IoT. They are always out there, probing for an opening, altering their disguises, trying novel attacks.
Between our world and this mayhem stand firewalls—layers upon layers of defenses built over historically shaky foundations, always trying to catch up with the attackers. Over the years firewalls have grown from light-weight software packages into multilayered, hardware-reinforced defenses in depth. They have marshalled new computing technologies. And by watching their continuing battle, we can get an understanding of what security will mean, not just in data centers, but at the edge of the IoT—in edge computing and in endpoints.
![]() |
E-mail This Article | ![]() |
![]() |
Printer-Friendly Page |
|
Altera Hot IP
Related Articles
New Articles
- How the Ability to Manage Register Specifications Helps You Create More Competitive Products
- EAVS - Electra IC Advanced Verification Suite for RISC-V Cores
- Why RISC-V is a viable option for safety-critical applications
- Dimensioning in 3D space: Object Volumetric Measurement by Leveraging Depth Camera-based Reconstruction on NVIDIA Edge devices
- What is JESD204B? Quick summary of the standard
Most Popular
- System Verilog Assertions Simplified
- System Verilog Macro: A Powerful Feature for Design Verification Projects
- PCIe error logging and handling on a typical SoC
- Enhancing VLSI Design Efficiency: Tackling Congestion and Shorts with Practical Approaches and PnR Tool (ICC2)
- Synthesis Methodology & Netlist Qualification