Title: Network overlay and Crypto service
Abstract: Security policy is a critical networking technologies, this talk is intended to explore the different crypto service model. Such as overlay security, content security & application security. To implement this security model, the new feature in DPDK, AES-NI, QAT, Hyperscan can be the technology ingredient to accelerate the technology readiness, and how to intercept the Tungsten Fabric feature roadmap.
Name: Heqing Zhu, Ping Yu
Email: heqing.zhu@intel.com; ping.yu@intel.com
Target: Full talk