781.897.1727
NFI Logo - blog featured image
07
Jan

Migration of existing applications to Cavium OCTEON using its SDK/ADK and/or Linux Kernel for acceleration

If you are developing a processor intensive network application, such as encryption/decryption, Virtual Private Networks, intrusion detection and prevention, or Network Attached Storage appliances, you’ll need a highly-integrated security and network application processor chip...
NFI Logo - blog featured image
10
Nov

Northforge Increases Performance of Mission Critical Device Powered by Cavium OCTEON® Processor

Making devices perform faster is always a challenge, but a challenge that drives us to develop the very best solutions.  Recently Northforge was tasked with increasing the performance of a mission critical Cavium OCTEON® -based device by a factor of 3-4X – certainly a tall order....
NFI Logo - blog featured image
25
Sep

What Not to Bring into the Cloud

As enterprises and service providers look to offer on-demand computing resources and need to manage large networks of virtual machines, many companies are looking to the OpenStack cloud computing platform as a way to gain the flexibility they need to design their cloud. ...
NFI Logo - blog featured image
06
Aug

Challenges that need to be overcome before NFV can be commercialized

In our last blog post on our three-part series on Network Functions Virtualization, commonly known as NFV, let’s look at what’s holding us back from commercializing NFV. We know that as carrier revenue growth flattens, the cost to grow network footprint and capacity will become...
NFI Logo - blog featured image
05
Jun

What is NFV and why is it significant to the networking industry?

June 9, 2014 – What is NFV and why is it significant to the networking industry? With the increasing number of smart phones and mobile devices, more businesses and enterprises are depending on improved network communications. Consumers are demanding more information and...
NFI Logo - blog featured image
15
May

What is OpenID and why is it important?

In today’s web environment the authentication of users is a very frequent task. Users are asked many times to enter repetitive information in order to create yet another account. But their digital identity on ad hoc systems might be only protected by a very thin security layer...
22
Jan

SIP Security: How Much is Enough?

Everybody wants to think that their telephone service is secure. While the security of phone communications has always been a concern for users and service providers alike, it has become an even bigger one in the Internet and VoIP era, and the recent events involving the NSA are...
Northforge Innovations
17
Dec

OpenStack Virtualized Network Simply Explained

This is the final blog in the OpenStack Cloud software platform series. This blog gathers some of the most interesting and up to date information available regarding OpenStack’s virtualized network. OpenStack Virtualized Network It is essential that an application understand how...
Northforge Innovations
03
Dec

OpenStack Metrics Simply Explained

This is the second blog in OpenStack software platform series.  This blog gathers some of the most interesting and up to date information regarding OpenStack performance metrics. OpenStack Metrics A cloud deployment environment changes as commodity hardware is seamlessly added or...
Northforge Innovations
13
Nov

OpenStack Simply Explained

Northforge has created a 3 part blog series that looks at some of the most interesting and up to date information available on the internet regarding the OpenStack software platform. OpenStack is a collection of open source projects that can provide cloud management of network...