Light Reading
Information Resources
Latest Content
Page 1 / 2   >   >>
New Synchronization Requirements for 4G Backhaul & Fronthaul – by Heavy Reading
Information Resources  | 
12/18/2014  | 

Year after year, customers expect mobile operators to somehow keep at least one step ahead of the acceleration in mobile data consumption. Operators must some- how deliver on a long-term capacity roadmap that will allow customers to consume whatever high-bandwidth services they want, wherever and whenever they want them. And investors expect them to do all this without increasing the total cost of ownership of the network, taking account of both capex and opex.

This white paper examines the available options for operators with Long Term Evolution (LTE), LTE-Advanced (LTE-A) and the various small cell and centralized radio access network (C-RAN) architecture options for implementing them. The paper provides examples of early deployments of these techniques and architectures and discusses the associated requirements for network synchronization and synchronization testing as these capacity enhancements are rolled out.

The Rise of Chinese Standards
Information Resources  | 
12/16/2014  | 

At the beginning of WCDMA development, Chinese operators tried to obtain a greater say in WCDMA. European Telecommunications Standards Institute (ETSI) announced that it would develop 3G standards through international cooperation and especially welcomed China, Japan, and Korea to participate in standard development.

TD-SCDMA was a sudden development, hastily developed from TD-CDMA of Siemens.

In May, 2000, under the strong support of Ministry of Industry and Information Technology (MIIT), China Mobile, and China Unicom, the International Telecommunication Union (ITU) officially declared the Chinese TD-SCDMA, together with European-led WCDMA and American CDMA2000, as 3G international standards. For the formulation of TD-SCDMA standards, manufacturers outside China gave a cold response. Some manufacturers even said that they had ability to implement TD-SCDMA but they would not do that.

According to the telecom authority, although the Chinese government gave the support necessary for the development of TD-SCDMA, it did not gamble with entire telecom industry of China.

However, this level of governmental support was not enough to convince operators to adopt TD-SCDMA, which was already lagging behind other technologies in commercialization. The last move that elevated TD-SCDMA to the level of national strategy is a letter in 2005. According to insiders, Zhou Huan visited several heavyweight scientists to seek their help, including then Presidents of the Chinese Academy of Sciences, the Chinese Academy of Engineering, and the Chinese Associate for Science and Technology. As a result, these scientists drew up a joint petition to the central government asking for deploying TD-SCDMA as a key to China's "self-innovation".

The petition had a profound impact on the developments of TD-SCDMA. The letter by the presidents of China's top-3 scientific institutions drew great attention from the top decision-makers of the Chinese government, who commented that TD-SCDMA was crucial to the development of mobile communications in China. This comment gave many people the impression that China was going all in with all resources to develop TD-SCDMA.

Mobile World Congress – making the most of the show
Information Resources  | 
12/2/2014  | 

This document is intended to provide practical advice to companies attending the show. It will cover a number of the key platforms Mobile World Congress offers including: how best to pitch for a speaking opportunity, how to get shortlisted for a Global Mobile Award, how to attract the attention of attending media and analysts and how to navigate the show in general.

All of our tips are based on our extensive experience of maximising the show for our broad client portfolio. Our clients in the mobile space currently include network infrastructure providers, network software vendors, messaging companies, customer experience experts and industry consultants.

Every year, our telecoms team relocates to Barcelona for the week, providing our clients with a bespoke service designed to successfully coordinate a significant amount of activity planned in advance. The work we deliver is not restricted purely to exhibitors. Over the past few years, we have seen an increasing number of delegates attend the show without exhibiting. The show has plenty to offer all companies, regardless of whether or not they take an exhibition stand.

Mobile World Congress is a fiercely competitive event – for media and analyst attention; for successfully being added to the conference programme as a speaker; and being shortlisted for and ultimately winning a Global Mobile Award. We hope you find our advice useful.

Internet Security Threat Report 2014: Volume 19
Information Resources  | 
12/2/2014  | 

This network monitors threat activity in over 157 countries and territories through a combination of Symantec products and services such as Symantec DeepSight™ Threat Management System, Symantec™ Managed Security Services, Norton™ consumer products, and other third-party data sources.

In addition, Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 60,000 recorded vulnerabilities (spanning more than two decades) from over 19,000 vendors representing over 54,000 products.

Spam, phishing, and malware data is captured through a variety of sources including the Symantec Probe Network, a system of more than 5 million decoy accounts,, and a number of other Symantec security technologies. Skeptic™, the proprietary heuristic technology, is able to detect new and sophisticated targeted threats before they reach customers’ networks. Over 8.4 billion email messages are processed each month and more than 1.7 billion web requests filtered each day across 14 data centers. Symantec also gathers phishing information through an extensive anti-fraud community of enterprises, security vendors, and more than 50 million consumers.

Symantec Trust Services provides 100 percent availability and processes over 6 billion Online Certificate Status Protocol (OCSP) look-ups per day, which are used for obtaining the revocation status of X.509 digital certificates around the world. These resources give Symantec analysts unparalleled sources of data with which to identify, analyze, and provide informed commentary on emerging trends in attacks, malicious code activity, phishing, and spam. The result is the annual Symantec Internet Security Threat Report, which gives enterprises, small businesses, and consumers essential information to secure their systems effectively now and into the future.

What You Can Do to Stay Ahead of the OTT Curve
Information Resources  | 
12/1/2014  | 

In today’s fragmented world of multiplatform content, staying ahead of the over-the-top (OTT) curve can be challenging. You need to understand your customers: who are they, what are they watching, when are they watching, where are they doing it, why are they choosing particular content, and exactly how are they finding and consuming all of it, anyway.

In this White Paper, Ooyala explores:

  • Key trends shaping OTT audiences
  • How to analyze your market position and optimize your strategy
  • How to monetize the consumer content journey
  • How some companies have reached their goals with digital video
Centralized Operations: Strategies for Today and Tomorrow – Higher Efficiency, Better Quality, Quicker Readiness
Information Resources  | 
12/1/2014  | 

The Communications Service Provider (CSP) business is undergoing radical change as a result of significant shifts in market dynamics. To remain competitive or grow market share, many CSPs are determined to evolve from traditional telecoms business operations towards new business models. Enabling the evolution of Telecoms and IT convergence, new technologies such as Self Organizing Networks (SON) driven by 4G/LTE network rollouts, Cloud-based RAN, Software Defined Networks (SDN) and Network Function Virtualization (NFV) will have a tremendous impact on CSP business models and the way networks are designed, implemented and operated.

Centralization of operations is core to the transformational journey to digital convergence. Centralization is essential if CSPs are to optimize the management of business and network operations, deliver cost savings, improve time to market and deliver improved quality assurance and customer experience, and future-proof their operations. SDN/NFV will play a particularly important role in centralizing and optimizing network management, intelligence and control, although a phased approach is recommended, making use of a close strategic partner to help guide and implement the process.

Global Operations Centers (GOCs) will also be needed to facilitate system, process and organizational changes through a series of controlled and phased transformations and migrations and for maximum effect and success these should be implemented in collaboration with an experienced solutions delivery partner.

This brief white paper looks at the challenges and benefits of the Centralization model as well the phased approach required to deliver a successful centralization transformation.

ACG Research Report - Business Case for NFVSDN Programmable Networks
Information Resources  | 
11/20/2014  | 

Juniper Networks has launched High-IQ, a programmable networking approach, that leverages network function virtualization (NFV) and software defined networking (SDN) to create networks that are automated, scalable, and customizable, enabling rapid service provisioning based upon actionable intelligence. Programmable networks allow service providers to automate network operations for simplicity and agility in response to dynamic service needs while reducing operational costs; scale the network infrastructure with silicon, SDN, and network fabric virtualization to deliver the performance and efficiency needed to economically meet demand; and rapidly create new, customizable services to increase revenue and brand equity.

ACG Research analyzes three programmable High-IQ network use cases that were created by Juniper Networks. The analyses show the benefits derived from the deployment of programmable networks for service providers. A cloud customer premise equipment (CPE) and virtual firewall (vCPE) use case replaces physical CPE with a simple on-premise Ethernet device and moves IP virtual private network (VPN) and firewall functions to the cloud. This produces a 36 percent five-year net present value (NPV) increase as compared to the physical CPE solution. A real-time network self-optimization use case replaces manual traffic engineering processes. This produces a 27 percent five-year total cost of ownership (TCO) savings compared to the manual processes. An elastic traffic engineering use case for a national all IP core network demonstrates the advantages of an SDN solution as compared to the present mode of operations. The SDN solution reduces bandwidth and associated link capital expenses (capex) by 35 percent while maintaining all network service level agreements.

Virtualization to Transform Service Provider Business and Operational Economics
Information Resources  | 
11/20/2014  | 

These dynamics have service providers of all types seeking evolutionary technologies to help them transform their business and operations economics, turning traditional edge infrastructures into more agile, efficient, and service-focused networks that are closely aligned with their business goals. One particularly promising technology is Network Functions Virtualization (NFV), which decouples a wide range of network functions from specialized hardware elements and enables their operation as software on commercial off-the-shelf (COTS) x86 servers. Compared to current infrastructure, NFV increases revenue and margins by reducing the time, cost, and complexity associated with service innovation. Routers, the foundational service element in the network edge, are an ideal target for virtualization, depending on the need. This paper examines the challenges that virtualized edge routers must overcome and the benefits they can provide in several potential use cases. This document is intended for product managers seeking innovative ways to efficiently deliver edge services to business, residential, and mobile consumers.

Video: Contrail Cloud demo
Information Resources  | 
11/20/2014  | 
Adobe Digital Index: U.S. Digital Video Benchmark Q214
Information Resources  | 
11/15/2014  | 

RESEARCH Adobe Digital Index: U.S. Digital Video Benchmark Q214. Online TV growth accelerates in 2014 – 388% YoY.

As publishers and advertisers look to engage viewers, they need to be aware that online video (unauthenticated) and online TV (authenticated TV Everywhere) viewing behaviors are changing. With more access points, including mobile, Apple TV, and Xbox consoles, and an ever increasing supply of premium content, the number viewers of free online videos and online TV is reaching new record levels every quarter. Advertisers are also seeing much more value in digital audiences, which are also easier to quantify and target than with traditional broadcasting, and are finally able to reach mass scale via digital video marketing. With this shift in viewing habits, advertisers must adopt strategies to incorporate digital viewing.

Get the insights and trends on the explosion of online video consumption, the acceleration of growth of online TV and increasing relevance of over-the-top (OTT) devices.

Online Media Player Comparison Study: Desktop and Mobile Player Performance, Sept 2014
Information Resources  | 
11/15/2014  | 

RESEARCH Online Media Player Comparison Study: Desktop and Mobile Player Performance, Sept 2014. By Transitions, Inc. Adobe Primetime player performs much better than industry averages.

Market analysis from two previous Transitions In Technology reports, released last month, led to this most recent comparison study of desktop and device players. Here we gauge performance and establish much-needed baselines for an emerging set of Online Media Players (OMPs) that have attracted content owner and consumer alike.

This report dives deep to study technical topics like power consumption, load times, CPU and memory usage. This report also provides a subjective assessment of quality.

Given Adobe’s mastery of Flash Player, AIR, RTMP, and growing knowledge base around HLS, one expects Adobe to have also mastered design of high-performance, low-impact SWF players and video streams.

In the report, Adobe continues to shine in the performance of Primetime player, including an ability to push more bits at a higher quality than almost any other comparable OMP. No one else that we tested beats Adobe in terms of frames delivered without dropping a frame. The company is also a clear leader in sustained bitrates and perceived quality.

ABI Research competitive assessment, Sept 2014
Information Resources  | 
11/15/2014  | 

RESEARCH ABI Research Competitive Assessment, Sept 2014: Adobe finishes first in the Digital Rights Management (DRM) Market. A commitment to delivering premium TV experiences anywhere, anytime.

The “Pay TV Middleware, Conditional Access (CAS), and Digital Rights Management (DRM)” report ranked Adobe first out of nine major DRM vendors in the competitive assessment. ABI Research Practice Director Sam Rosen commented, “Adobe’s Primetime strategy is solutions focused and addresses a number of pain points in video workflows, including DRM as well as packaging, advertising and authentication. Adobe’s investment in the authentication infrastructure (Adobe Pass) between U.S. cable distributors and cable programmers provides significant lift in value to the solution.”

The report addresses:

  • Flexibility to host digital rights management on servers or in the cloud
  • UltraHD content capabilities and integration with HTML5
  • Easy authentication for unlocking pay-TV content on any website, app or device
Adblocking goes mainstream
Information Resources  | 
11/15/2014  | 

RESEARCH Adblocking goes mainstream. PageFair and Adobe 2014 report: See an in depth overview on how adblocking is changing ad viewing behavior and get ahead of the shift.

In this sequel to the August 2013 report (The Rise of Adblocking) PageFair, with the help of Adobe, reveals data on the true scale and growth of adblocking as well as where it is having the biggest impact. To see what motivates people to take action against current forms of online advertising this report has also been supplemented with a survey of adblock users.

PageFair data was used to track 4.05 billion blocked ads across 21.1 billion website visits around the globe. A survey was also conducted and analyzed (jointly with PageFair) comprising 1,621 respondents asking questions centered around adblocking product knowledge and behavior.

Get insights on:

  • The rapid expansion of the adblock user community and browser support
  • World adoption with leaders continuing to expand and new countries catching up
  • User demographics and the struggle of “pay” and “free” content models
  • Mobile – the next evolution HLS Pro - Not All HLS Solutions Are Created Equal
Information Resources  | 
11/13/2014  | 
  1. H.264 profiles Baseline, Main, and High can all be mapped based on individual device requirements.
  2. HLS audio only streams can be created to expand device support even further, and Dolby’s HE-AAC codec provides superior audio quality at lower bitrates as compared to the open source libfacc codec.
  3.’s HLS Pro also supports the creation of multiple audio streams so the best stream can be delivered on a device by device basis.
  4. If Closed Captions are a requirement, HLS Pro supports the latest closed caption standards, WebVTT & CEA-608, ensuring accessibility.

Maximum Compatibility
We provide HLS presets engineered, tested, and Apple reviewed to serve all screen resolutions and maximize compatibility across the top 30 smartphones and tablets for both iOS and Android.

Maximum Control
Customize all encoding parameters on a per-stream basis. Leverage HE-AAC for the highest quality audio at the lowest bit rates. Package output as .tar or .zip files for most efficient delivery.

Lowest Overhead’s proprietary HLS segmenter has the lowest overhead in the industry which equals tremendous storage savings.

Fastest Processing
Parallel dedicated 16-core processing of all individual streams ensure that even the largest libraries, targeting complex 12 bitrate HLS outputs, are completed in a fraction of real-time.

We’ve even completed and in-depth competitive analysis of leading cloud based HLS solutions. With’s HLS Pro feature set, one thing is for sure. All HLS Solutions are not created equal.

Information Resources  | 
11/10/2014  | 

This white paper is for network systems developers and operators who wish to transform operations models for their Juniper-based Internet Protocol (IP) networking infrastructures using IT DevOps methodologies. The paper will examine how specific features and capabilities of Juniper Networks® Junos® operating system, the OS that powers all Juniper routers, switches, and firewalls, not only integrate into existing IT DevOps environments but also help build and maintain networks for continuous delivery—a key concept of DevOps.

The ability to deliver highly available networking services is an absolute requirement. Many mission-critical applications rely on the network infrastructure as the primary service delivery vehicle. Network operators and systems administrators alike are challenged to maintain infrastructures with 100% availability and zero downtime; the network must be available at all times and at all costs, even during service-related upgrades or maintenance operations following a failure. In many instances, preserving uptime and availability means new applications and services must be tested and moved into production without impacting existing services. How is this possible? Is it feasible to build redundancy at every stage of the network, from the end user to the application server? Is there a better way?

DevOps methodologies have addressed some of these challenges by exploiting automation and orchestration across all elements of IT infrastructures—compute, storage, and networking. Automation helps eliminate repeatable manual tasks through scripts or other software tools; orchestration is an extension of automation that groups automated tasks into workflows. In the realm of IT infrastructures, these workflows may include several networking, server, and storage devices. As a result, these automation tools not only have to be agile and robust enough to efficiently control the underlying devices, they must also be versatile and open enough to communicate securely through a rich set of programmatic interfaces and protocols for seamless integration into frameworks that comprise the complex ecosystem of orchestration tools.

Among Juniper’s product offerings, Junos OS provides components that are critical to this ecosystem, delivering automation tools that execute repeatable manual tasks at speed, reducing errors, and achieving scale for service delivery while integrating seamlessly with popular orchestration frameworks used in established DevOps IT environments.

Big Data Analytics for Communications Service Providers
Information Resources  | 
11/5/2014  | 
As a Communications Service Provider (CSP), you face an increasingly challenging business environment. Revenue from traditional sources continues to decline. Regulatory action, designed to foster competition, is driving prices down. By allowing you to gain a deeper understanding of what your subscribers are doing on your network, Big Data is the key to helping you unlock a successful future. This paper outlines the ways Big Data helps with two principal areas: network optimization and customer relationships. It also provides guidelines for selecting the best Big Data vendor for you.
USA FREEDOM Act: End of Section 215 Bulk Telephony Metadata – What now for CSPs?
Information Resources  | 
11/5/2014  | 
The passage of enabling legislation, currently dubbed the "USA FREEDOM Act," will introduce new requirements for Communications Service Providers (CSPs) in regards to the handling of lawfully authorized requests. So what does this mean, and what will the implications be, for CSPs? Download the whitepaper to learn more about the legislation, the specific challenges presented by it and the next steps to take.
Open Clouds Reshape IT Infrastructures
Information Resources  | 
11/5/2014  | 

For enterprise IT, cloud computing has become the key to unlocking the future of IT infrastructure. Future IT infrastructures will require compatibility with existing resources so that enterprise services can run efficiently, including the ability, to leverage Internet innovations such as Big Data.

Openness is mission-critical to achieving this, to 1) optimize legacy IT facilities; 2) implement agile, intelligent services that incorporate the Internet innovation of other developers; and 3) prevent vendor lock-in and minimize costs.

Simplify and Automate for Enhanced Service Agility
Information Resources  | 
10/24/2014  | 
Faster, changing market demands. Revenue pressures. New business models and applications. With so much in service provider environments in flux, it's no surprise that operational processes have to change as well. The Internet of Everything demands faster business responsiveness and economies of scale. Services and their features must be made available more quickly and with lower cost to ensure competitiveness and acceptable margins.
Network Optimization Through Visualization - Where, When, What and How?
Information Resources  | 
10/23/2014  | 
Virtualization is not a new concept but it is now being applied to network functions such as those in switches, routers, and the myriad network appliances deployed. The expectation is for sizable costs savings and greatly reduced network complexity. The early days of server virtualization had a dramatic impact on lowering server capital expenditures. Yet operational costs skyrocketed as more labor-intensive and complex processes were required. Eventually these costs were reined in with more integration of servers and network infrastructure and more advanced software capabilities. So what lessons can operators learn from the past experience with server virtualization? Beware of merely shifting costs from capital to operating expenditures. Be selective in virtualizing the right resources and functions driven by the business need, and not the technology lure. Let lowering total cost of ownership with a flexible, adaptable infrastructure be your focus in regard to optimization.
From Dumb Pipes to Smart Services - Adding intelligence to the core network with L4–L7 networking devices
Information Resources  | 
10/21/2014  | 

To optimize performance, keep costs under control and monetize the services, operators need a new approach to managing traffic. Traditionally, mobile operators handle growth in traffic volume and complexity by increasing capacity – adding hardware to the core and radio access network – and by enhancing IP routing to direct traffic to the required network elements more efficiently. However, scaling-out to support the expected growth in traffic volume and the expanding range of new services, while maintaining high levels of QoE, is proving to be cost-prohibitive. In the core network, IP routing at the OSI layers 1 to 3 (L1–L3) guarantees fundamental traffic management, but it is running up against its limits. With applications generating data flows with different sets of requirements, routing traffic complexity has increased to a point at which, because it lacks understanding of the protocols and applications, basic IP routing is not sufficient.

By using L4–L7 intelligence to manage traffic, operators can move beyond these limitations of IP routing. While IP routers provide fast routing of packets, in a mobile environment, they lack the intelligence needed to optimize the use of network resources, leading to network inefficiencies. An L4–L7 device in the data and signaling plane understands the higher layers of the network stack, from the protocol to the application layers, and so it can leverage network intelligence for better routing decisions. This new approach requires operators to shift the focus of traffic management from packets to traffic flows, from basic IP routers to high-layer proxies, and from carrying data to support of services and applications. This change in focus enables them to closely monitor and improve the performance target that matters the most: the QoE, which captures the end-to-end network performance from the subscriber viewpoint. Providing higher QoE and end-to-end user experience is crucial for operators to move from the financial constraints of a dumb-pipe strategy, to offering smart and innovative revenue-generating services.

This paper examines the drivers behind the shift toward traffic management at L4–L7, and how this evolution benefits operators and their subscribers. First, we discuss the implications of moving up in the OSI stack and of using an application-aware approach. We then explore the impact of L4–L7 networking devices, both in the data plane and in the control plane, across five domains: dynamic traffic management, TCP optimization, context-based use of network resources, Diameter signaling traffic optimization, and network/DNS protection.

Wo Cloud: Use Case Share
Information Resources  | 
10/17/2014  | 

Nowadays mobile traffic is growing at a significantly high rate. Several forecasts, predict that the mobile data traffic will grow at a Compound Annual Growth Rate (CAGR) of 66% for 2012-2017. Furthermore, the tremendous increase of new high-end Internet devices and of the scale and complexity of modern network applications will further drive this significant growth in traffic. This will impose additional demands and requirements on the supporting communication network. Furthermore, and especially for cloud applications, the cloud tenants and developers usually need to use the communication network capabilities easily, accurately and efficiently. In this way, the deployment of new applications and services may be accelerated and the user experience can be improved. In order to support these demands, the communication network needs to provide graceful adjustment of network capabilities in order to accommodate the diverse needs of applications and the rapid network evolution. Moreover, according to ITU-T a radical change in core networking technologies, devices and network architectures is required in order to achieve the performance scalability levels needed to cope with the expected traffic increase. In order to solve these challenges, new models, mechanisms and protocols are required by applications to easily, accurately, and efficiently select and use the available communication network capabilities, i.e., network management and/or traffic conditioning/steering. Several concepts and technologies have been proposed for this purpose, but none of them has actually solved the challenges described above.

Wo Cloud, a world-class full-service cloud computing and big data brand, is designed to solve these challenges by providing solutions to the following topics: (1) integrate SDN (Software Defined Networking) solutions with OpenStack Neutron (2) solving network issues across both virtual and physical network, (3) orchestrate per tenant virtual (logical) network which spans geographically distributed multiple data centers, (4) support multiple services (firewall/VPN/load balance) to be dynamically sequenced and inserted as per tenant requirement, (5) provide a top level orchestrator that can orchestrate the data center infrastructure as well as the supporting services within hours, (6) handle scalability and elasticity (scale in and out) efficiently.

This white paper introduces the Wo Cloud concept and describes its architecture, implementation and the lessons learned. Furthermore, this paper introduces the NFV (Network Function Virtualization) concept and presents the SCiON (Service Centric Open Network) and SUPA (Shared Unified Policy Automation) concepts, which are applied and used in Wo Cloud. SCiON improves Quality of Experience (QoE) for end user applications by providing service centric programmable networks. Furthermore, SCiON empowers cloud based and multi-tenant applications, and enables a new class of Virtual Networks that are able to (1) run on one network infrastructure, (2) form a topology tailored for many application-specific requirements, (3) share multi-vendor network elements, (4) enable applications to map services and policies to infrastructure and (5) deploy new applications on top without changes to infrastructure below. In addition to all these capabilities, SCiON accelerates innovation, by applying a service centric innovation cycle and by using the Development Operations (DevOps) trend, to enable fast and continuous delivery of services and products. SUPA is a novel concept that realizes the SCiON objectives. SUPA supports four main capabilities: (1) Service Modeling to create data models such as L2VPN, L3VPN, and Traffic Steering, (2) Network Modeling to create abstracted network information models and corresponding network data models, (3) compile data structures of service models and network models which is needed to configure the network elements, (4) map the network model configurations to the network element configurations.

THE SDN TRANSFORMATION: A Framework for Sustainable Success
Information Resources  | 
10/16/2014  | 

The promise of Software Defined Networking (SDN) is gaining more and more attention as traffic growth increases the costs and complexity of network operations. This white paper explores how SDN-based solutions can transform today’s rigid transport infrastructure into a highly programmable network, one that is just as flexible, efficient and seamlessly scalable as data-center computing and storage resources. By deploying the right SDN-enabled solution, service providers can capitalize on the opportunity to migrate their multi-layer transport networks according to their individual business strategies and budgetary considerations to both increase revenue and lower costs.

There is a great opportunity waiting for service providers, driven by the widespread adoption of cloud-based applications by both enterprises and consumers. It’s a chance to capitalize on the elastic network needs of on-demand cloud computing and storage to create new sources of revenue and better control CAPEX/OPEX costs. Unfortunately, the lack of elasticity in most of today’s static networks makes it difficult for service providers to deliver the on-demand bandwidth necessary to support dynamic applications in a fast, cost-effective and profitable way.

The on-demand nature of cloud-based applications makes for unpredictable traffic volumes, often characterized by spikes in usage. These dynamic traffic volumes present service providers with another challenge as they try to plan and engineer appropriate levels of network capacity to satisfy users’ bandwidth demands.

The fast-growing popularity of cloud-based applications has rendered service providers’ traditional business models obsolete. In today’s fiercely competitive networking market, service providers clearly need a new business model, which enables them to capitalize on the proliferation of cloud-based applications and services. To construct that new business model, service providers are seeking networking solutions built on Software Defined Networking (SDN) architecture.

An SDN-based solution transforms today’s rigid transport infrastructure into a highly programmable network, one that is just as flexible, efficient and seamlessly scalable as data-center computing and storage resources. With this new, highly-adaptive network, service providers can make their transport networks sufficiently flexible to deliver, on demand, the bandwidth that consumer and business end users need for their cloud-based applications.

SDN MIGRATION STRATEGIES - The Case for Transitioning to an SDN-enabled Network
Information Resources  | 
10/16/2014  | 
In order to gain these benefits in the real world, operators must pragmatically evolve existing networks to harness the true capabilities of SDN technology. This new white paper describes three key migration strategies that can be employed to evolve a multi-layer network to a Software Defined Network - Management System Migration, Hybrid Mode Migration, and Chameleon Mode Migration.
SDN and NFV Strategies: Global Service Provider Survey
Information Resources  | 
10/16/2014  | 

Providers believe that NFV and SDNs and are a fundamental change in telecom network architecture that will deliver benefits in new services and revenue, operational efficiency, and capex savings.

Top drivers for service provider NFV and SDN investments and deployments are:

  • Service agility and quick time to revenue
  • A global view of network conditions across different vendors’ equipment, network layers, and technologies (routers, switches, DSLAMs, mobile core, mobile backhaul, etc.)
  • The ability to simplify provisioning of services and virtualize their networks through a consolidated management plane, obviating the operational tedium of utilizing various vendor-specific management systems

Key findings and recommendations:

  • Nearly every operator we talked to was likely to deploy SDNs or NFV in some aspect of their network at some point—97% will deploy SDN, 93% will deploy NFV, the others don’t know yet.
  • Many carriers in 2014 are moving from their proof of concept (PoC) investigations/evaluations for SDN and NFV to working with vendors on the development and productization of their software that will become the basis for commercial deployments.
  • Operators want SDNs/NFV in most parts of their networks
  • Service providers are targeting many more than these top 5 target use cases (see discussions/definitions later) for NFV in 2014-2015:
    • Business vE-CPE
    • Service chaining
    • vIMS core
    • vCDNs
    • vPE
Their Special Sauce Cloud Service Providers and Their Software-Defined Networks
Information Resources  | 
10/16/2014  | 

Enterprises are looking at what workloads they wish to run internally on private clouds and at how they can derive meaningful benefits from hybrid cloud models. Meanwhile, cloud service providers (CSPs) are preparing to meet the groundswell of enterprise demand. They have virtualized their datacenter compute infrastructure, and now they are looking to software — including software-defined networking (SDN) and virtualized network functions (for network and security services) — to provide the automation, agility, and elasticity that will help them meet their operational requirements and provide substantive business value in the form of opex and capex savings.

In this white paper, IDC examines how SDN and other software-based network infrastructures can provide an integral fulcrum on which CSPs can align their network infrastructure with the requirements and business objectives of their customers.

Wireless Network Virtualization - Ensuring Carrier Grade Availability
Information Resources  | 
10/15/2014  | 

Network functions virtualization (NFV), a rapidly growing initiative in telecom networks, promises to revolutionize how networks are architected and managed. It allows communications service providers (CSPs) to virtualize network functions and consolidate them on standard off-the-shelf servers.

Although 4G LTE is effective at meeting the increasing bandwidth demands at lower costs than its predecessors, its mobile base station, E-UTRAN Node B (eNB), located at the edge of the radio access network (RAN), is underutilized at certain times of the day and has grown in complexity, resulting in higher downtime and field maintenance costs. As a result, the eNB is a good candidate for NFV. Cloud-RAN (C-RAN) is the virtualization of the eNB’s control plane and data plane functions, consolidating it in one or more data centers. The result is significantly higher equipment utilization, cost-efficient redundancy to achieve high availability, and lower operations and maintenance costs.

However, to realize these benefits, the foundation for virtualized eNBs must be a robust, carrier grade NFV platform that incorporates advanced fault management features. Poor implementation results in lower quality execution with excessive outage and maintenance costs. Wind River® Titanium Server is the industry’s first NFV-ready solution that incorporates advanced carrier grade fault, security, performance, and network management features. Titanium Server supports a broad range of affordable redundancy configurations, giving CSPs the flexibility to meet a range of availability targets, including ”six 9s,” or 99.9999% uptime at the service level.

DNS Security for Service Providers: An Active Approach at L7 - by Heavy Reading
Information Resources  | 
10/9/2014  | 

In the evolution to all-IP, the DNS has become a critical network protocol. In all but the smallest service provider networks, these transactions are now taking place at the rate of millions per second.

Because of its importance, a company's DNS infrastructure has for some time been one of the favorite targets of hackers. The attack type traditionally associated with the DNS has been a Distributed Denial of Service (DDoS) attack, which overloads the servers with an overwhelmingly large volume of communication requests, thus rendering them unavailable to legitimate service requests.

The motivation and organization of attackers has changed fundamentally. Whereas early attackers tended to be isolated individuals that bore a grudge or were just social misfits, today's attackers are far more organized, much greater in number and far more heavily resourced – including organized crime, terrorist organizations and even nation states. Attack tools have also been greatly simplified, so that the expertise needed to leverage them is much less than it used to be. Many attack tools are also available online at low cost.

As a result, attackers are investing a lot of resources in finding new ways to attack and manipulate DNS resources for criminal ends. Not only are attackers finding new ways to overwhelm the DNS resources of businesses and services providers and render them inoperable. They are also leveraging and manipulating the DNS protocol itself as one of the most effective attack vectors for the exfiltration – stealing – of highly valuable, proprietary information from consumers and businesses, including service providers themselves.

Cisco Evolved Services Platform: Automate a New Class of Carrier Cloud Services
Information Resources  | 
10/8/2014  | 

Imagine if you could:

  • Have a platform that helped you transform your business and those of your customers
  • Accelerate your time to revenue while reducing operational costs
  • Deploy new services at web speed

The Cisco Evolved Services Platform (ESP) can help you achieve these dreams. It uses software-defined networking (SDN), Network Functions Virtualization (NFV), open APIs, and advanced orchestration capabilities.

You can achieve:

  • Automated service delivery
  • Improved network and data center use
  • Fast deployment of personalized offerings

Make it easy for your customers:

  • Offer prepackaged ESP services modules with default features, security, and service-level agreements
  • Let them select from a self-service portal and activate what they want with a click of a mouse
  • Make it easy for yourself - start by registering and reading this overview of Evolved Service Platform.

    Five New Laws of Antimalware Protection: Keep Up with Evolving Threats
    Information Resources  | 
    10/7/2014  | 

    If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.

    Executive ViewPoint – Transforming IT Sinkholes into Gold Mines
    Information Resources  | 
    10/7/2014  | 

    Consider this: It’s estimated that, in general, IT spends 80 percent of its budget on operations management and support costs, leaving only 20 percent for innovative solution purchases.

    “CIOs are being tasked with figuring out how to move more of their ‘run the business’ operational expense into innovation efforts while at the same time cutting overall costs,” says Lui Fogolini, vice president of Cisco Systems’ worldwide services organization. “They’re looking at reducing traditional budget areas by 50 percent, and that is a huge challenge that can’t be met with traditional operations management. They have to be able to do things differently.”

    So how can you achieve the seemingly impossible task of reducing operations costs without increasing the complexity of your IT environment?

    Cisco Services Perspectives
    Information Resources  | 
    10/7/2014  | 

    Creating a better product or service, reaching new markets and customers, and acquiring new assets are the traditional methods of pushing a business forward. But truth be told, business value doesn’t have to be built, sold, or purchased.

    Sometimes it can be found.

    The companies and strategies highlighted in the following pages showcase what can be accomplished when the resources on hand are optimized or utilized in new ways. Liberty Mutual Insurance, for example, has fine-tuned its network infrastructure to deliver new customer services and support meteoric growth (page 3). Alestra, one of Mexico’s leading information and communications technology providers, is tapping its technology resources and partners to reinvent its business and transform its service offerings (page 6). Some companies are finding a wealth of business value by connecting people and machines in novel ways (page 8). And others are using their collaboration solutions as a new source of business intelligence (page 12).

    How do organizations realize this hidden potential? By working with industry experts who know where to look, what to tap, and how to maximize the value contained within existing systems, processes, and resources.

    The Total Economic Impact™ Of Cisco SMARTnet Service
    Information Resources  | 
    10/7/2014  | 
    The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco SMARTnet Service on their organizations. SMARTnet is a technical support service that provides an organization’s IT staff direct, anytime access to Cisco engineers and extensive resources. Cisco SMARTnet Service differs from traditional warranty on Cisco products by providing accelerated hardware replacement options, Cisco operating system updates, direct access to Cisco Technical Assistance Center (TAC) staff, online troubleshooting and support tools, as well as proactive problem diagnosis. These capabilities provide an additional level of business continuity assurance within critical parts of the network environment.
    Reduce Network Expenses with SON
    Information Resources  | 
    10/6/2014  | 
    Accelerating a New Class of Mobile Services
    Information Resources  | 
    10/3/2014  | 

    The world is going mobile. With explosive growth in smartphones, combined with new machine-to-machine (M2M) and wearable devices, Cisco projects there will be 10 billion personalized mobile network connections by 2018, with mobile traffic growing at a 61 percent compound annual growth rate (CAGR).

    This represents a new playing field for applications, generating an enormous revenue opportunity for mobile service providers. But at the same time, it also places new demands on their networks and business, as well as operational processes. To capitalize on this opportunity, mobile operators need to do more than reengineer their networks. They need to rethink how they engage with customers and deliver new services in the ways customers want to consume them.

    The Cisco® Evolved Services Platform (ESP) gives operators this new consumption platform. It includes the necessary flexibility, scalability, and highest level of automation, unleashing a new generation of personalized consumer and business mobile offerings. By fully harnessing the power of network programmability, end-to-end service orchestration, and an open platform, operators can develop and innovate amazing new mobile service offerings. And they can bring them to market faster, while radically reducing their operational costs.

    Ensuring Smooth Evolution and Improving User Experience - Huawei helps China Unicom in LTE construction for BCIA
    Information Resources  | 
    10/3/2014  | 

    The time of LTE has come, leading to rapid data service growth. Network quality in hotspot areas is essential to customer perception. China Unicom had to think about the construction of hotspot areas such as airports, subways, and stadiums in the early stage of LTE deployment. Beijing Capital International Airport (BCIA) is the largest airport in China and boasts the second highest traffic in the world. BCIA holds a lot of highend moving users. Quality LTE networks can bring a carrier good brand image and business value. Therefore, the indoor coverage for BCIA was listed as a key project of China Unicom in 2014.

    Real-time, Open, and Intelligent - Key Capabilities of a Next-Generation OSS
    Information Resources  | 
    10/3/2014  | 

    With the popularization of advanced network and ICT technology, all industries including transportation, medicine, education, payment, and business operations are being digitized. People's consumption patterns are also evolving, which is represented by the acronym "ROADS". Real-time: Ubiquitous ultra-broadband provides users with access to apps, services, and content anytime anywhere. On-demand: Users can access content and resources on demand. All-online: All services are available online 24/7, and are accessible to users anytime anywhere. DIY: Users can obtain personalized and customized products and services via Do It Yourself options/scenarios. Social: Communication is now increasingly performed on social networking sites (SNS) and apps.

    For example, eHealth service is always online. Users can monitor their heart rate and blood pressure anytime. eHealth also supports realtime user health analysis. Users can configure parameters such as how regularly to measure heart rate, and can use these statistics to produce customized pie or bar charts to visualize the state of their health. They can then share these health reports with their friends online. Traditional voice and SMS services offered by telecom operators are no longer sufficient to satisfy customers' increasing communication needs. In an open digital economy, over-the-top (OTT) companies provide a rich variety of innovative services. Telco operating models are shifting from B2C to B2B2C. Meanwhile, thanks to diversification of network standards and networking models, such as heterogeneous networks (HetNets), the introduction of data center (DC) and IT devices, and the transition to software-defined networking (SDN) and network functions virtualization (NFV), telco infrastructure is becoming increasingly complex. To adapt to this new ecosystem, telcos must develop a next generation operations support system (OSS) – an Infrastructure Enabling System (IES) to tackle various challenges.

    Building Quality Brand MBB Networks - Targeting User-Experience for Quality MBB Networks
    Information Resources  | 
    10/3/2014  | 

    In recent years, with the large-scale deployment of Mobile Broadband (MBB) globally, especially LTE deployment, more and more users are accessing high-speed data services and are demanding superior service experience. Surveys conducted by Huawei at the 2013 Huawei User Congress reflect the same sentiments from the operators and the results of which are captured in this whitepaper.

    Optimizing Mobile Backhaul - Breaking the 4G Bottleneck
    Information Resources  | 
    10/3/2014  | 

    According to a mobile Internet white paper, mobile terminals have become people's primary portal to obtain information. Mobile phones today provide not only simple voice and SMS services, they also offer entertainment, SNS, video-on-demand/video surveillance, and high-speed Internet access services. In the future, video, SNS, and web browsing services will be the major data consumption services. Data consumed on video and micro blogs by Android/iOS devices will make up 50% of all data. Smartphones bring the surge of data consumption. The explosive increase in data consumption prompts global carriers to accelerate LTE deployment, and imposes an even higher demand on the mobile backhaul network.

    The deployment of LTE improves the bandwidth of wireless air interfaces. However, the traditional mobile backhaul network has become a bottleneck for LTE deployment. It restricts the upstream and downstream traffic flow and compromises user experience. The bandwidth of LTE networks is dozens of times higher than that of 3G networks. This means that the LTE backhaul network must be able to continuously evolve to higher bandwidth, meet the dynamic requirements of wireless technology, and flexibly interoperate with hybrid networks.

    Huawei's Self-Improving OSS
    Information Resources  | 
    10/3/2014  | 

    As a managed services (MS) solution, Huawei's operations support system (OSS) solution has long been serving the telecom industry. Huawei has developed a set of mature products and telecom value assets thanks to network O&M experience gained from hundreds of global MS projects. Huawei's OSS asset library is completely decoupled from products. It is independently developed, offered, and deployed, and can interoperate with OSS products from other vendors.

    Huawei's OSS solution matches customers' business process, offering the following key benefits:

    • Resource Management Facilitates Service Provisioning
    • Fault Management Improves Customer Service Efficiency
    • Automatic TT Management
    • Test and Diagnosis Accelerate Fault Location and Troubleshooting
    • Field Management: Right Personnel at Right Place and at Right Time
    • Active Performance Management and Assurance
    Huangcun IDC of China Unicom Beijing - China's First Warehouse Micro-modular IDC
    Information Resources  | 
    10/3/2014  | 

    China Unicom Beijing (hereinafter referred to as Beijing Unicom below) has reconstructed its two unused warehouses in Huangcun, Beijing, with a total area of 5600 square meters, into an Internet data center (IDC) using a warehouse micro-modular IDC solution. It is the first warehouse micro-modular IDC project in China. This project reuses idle assets to improve asset utilization and rapidly completes IDC deployment using on-demand planning, component prefabrication, and field assembling, helping Beijing Unicom seize market opportunities. The new IDC contributes to 50% of China Unicom Group's IDC business revenue. Beijing Unicom is planning its phase-2 IDC project, which will be composed of two equipment rooms covering a total area of 37,000 square meters. This new warehouse data center design won the "Innovation in Medium Data Center" award of Data Center Dynamics (DCD), which is considered as the "Oscar" in the data center industry.

    Network Sharing
    Information Resources  | 
    10/3/2014  | 

    Operators globally are embracing network sharing as a viable option to reduce their operating expense and capital spending, improve and/or expand coverage, reduce time to market, and to focus more on network and technology refresh. With networks mature in most regions of the world and service quality becoming the prime differentiator among the operators, network sharing is inevitable.

    Operators are more focused on the type of network sharing model to use and how best to cooperate with their competitors in sharing their networks while retaining control of their networks as much as possible. This of course brings certain level of complexities into the network in terms of execution and operations which needs to be managed carefully.

    Brazil World Cup: A Digital Sports Feast
    Information Resources  | 
    10/3/2014  | 

    During the World Cup, Brazil welcomed over 1.5 million tourists and over 3.3 million fans watched the games live. Outside the stadium, millions of fans gathered on Copacabana Beach and in bars and hotels. They used smartphones, laptops, tablets, and even smart watches and glasses to access the Internet, updating Facebook, Twitter, WhatsApp, and WeChat. They shared in real time every twist and turn of each game by uploading pictures and video clips or chatting with friends and families using these popular social media and messaging apps. Media agencies from over 100 countries and regions also broadcast-live the event to the whole world.

    Statistics show that during the games, the number of mobile users in Brazil increased by 48% and data traffic consumption quadrupled. During July 13's final game, more than 70,000 live spectators uploaded 2.6 million pictures, consuming roughly 1.43 million MB of data. Compared to the South Africa 2010 World Cup when only 3G coverage was available, this year's World Cup was an indisputable digital sports feast.

    VoLTE - The Future of Mobility Whitepaper
    Information Resources  | 
    10/1/2014  | 

    VoLTE has the power to change the competitive landscape – this time in favor of mobile operators who have lost some ground to OTT players such as Skype, Google, and others that have attracted many users with “freemium” rich communications services. The beauty of VoLTE, an all-IP technology, is that it combines LTE with IMS to efficiently deliver a full suite of desirable services such as IM, video chat, HD voice, presence, and group chat – all opportunities for carriers to differentiate themselves from OTT providers.

    VoLTE Troubleshooting: Protect the Customer Experience Whitepaper
    Information Resources  | 
    10/1/2014  | 

    Launching VoLTE requires continual tuning of both the access and core networks in order to establish, support and hand over mobile voice calls as subscribers move throughout the network—all while maintaining a quality of experience that is at-or-better-than existing service alternatives.

    Expectations developed over years of circuit-switched calling methods are further complicated by the variety of “free” OTT VoIP options concurrently utilizing the same LTE data network resources. In short, subscribers will be far less tolerant of a poor VoLTE calling experience, so troubleshooting teams must be ready.

    You can see examples represent some of the most likely issues your VoLTE customers will encounter (download this whitepaper). Issues more easily addressed with Tektronix Communications’ Iris Session Analyzer.

    Enabling Business and Operations Excellence for a Better Connected World
    Information Resources  | 
    9/30/2014  | 

    In the past few decades, incumbent CSPs have been long emphasizing providing reliable voice and data services, following an operational model that characterized by efficiency, costs, performance and user experience. Yet this model has been increasingly challenged by emergence of new technologies and the fragmented customer preferences they triggered. Mobile broadband (MBB) networks, fixed broadband (FBB) networks, and data centers have come about, and smartphone has penetrated every corner of the world. Complementing this, the constant innovation of digital apps for individual, family and enterprise customers and massive end user demand of information services has put tremendous pressure on traditional ways that incumbents operate their business.

    Distributed NFV Will Depend on Adaptable Orchestration Framework for Seamless Service Fulfillment – by Heavy Reading
    Information Resources  | 
    9/29/2014  | 

    Let us take a closer look at how operation support systems (OSSs) are designed to- day. In the context of service fulfillment, most operators are saddled with numerous siloed service fulfillment solutions customized for every service vertical. These siloed solutions are created and maintained to support services crossing different network devices and vendors, which leads to significant funds being invested with legacy OSS vendors and is a systemic hit every time a new service is added. Further, these ad hoc developments are not designed to be future-proof, but are tactical efforts undertaken to alleviate a given problem.

    System integration, professional services and support costs are a major impediment for most service providers. Heavy Reading research shows that Tier 1 operators spend on average 40-45 percent of their IT budgets on maintaining their legacy OSSs. Time to market of new services remains stubbornly high with an average of six to nine months. Opportunity costs for delayed service launch runs into the millions of dollars, negatively impacting the operator's bottom line.

    It is, therefore, not a surprise that as the number of services, the number of vendors to support, the growing appetite for sophisticated security systems and the evolution of network architecture accelerates, this legacy of ad hoc service fulfillment design becomes a roadblock in the way of service providers' transformation vision.

    Virtualization promises hardware vendor independence, improved operational efficiency, standardized and open interfaces and the dynamic chaining of network and IT functions to create new "integrated" services. The current industry attention paid to software-defined networking (SDN) and network functions virtualization (NFV) trends stems from the above.

    From DAA to Virtualization - a Migration Path toward a Software-defined Cable Access Network
    Information Resources  | 
    9/26/2014  | 

    DOCSIS has proven to be one of the most successful broadband access technologies. Since 2008, DOCSIS 3.0 solutions have been widely deployed to meet the even-increasing bandwidth demand of tens of millions of subscribers. To date, the consistently improving performance of DOCSIS solutions is at the core of competitiveness of cable industry, as demonstrated by the increasing ratio of cable broadband subscribers in many markets.

    However, the unabated 35-50% CAGR in bandwidth consumption is starting to assert pressure in all legacy broadband access networks including HFC. With an increasing number of Gigabit service offerings, MSOs are continuously evaluating a variety of options to enhance the efficiency of cable access solutions. Starting with the initial wave of Converged Cable Access Platform (CCAP) deployment in 2013, the focus is shifting toward intermediate and longer term objectives.

    In the intermediate term, as a significant portion of the HFC network are converted to Fiber Deep, a Distributed Access Architecture (DAA) solution such as Distributed CCAP (D-CCAP) will be utilized as a more effective alternative to I-CCAP in addressing space, power and cooling issues in the hub, as well as a strategic migration step toward FTTH. Compared to FTTH, D-CCAP offers a lower-cost FTTN option that is only available to the MSOs. As competition heats up, each Fiber Deep node can be readily converted to FTTH by replacing the Ethernet Node with an optical splitter and connecting the existing subscribers by drop fibers. D-CCAP is a key MSO advantage in the Gigabit era.

    In the longer term, the D-CCAP solution is optimized for migration toward virtualization. As envisioned by most in the cable industry, HFC will gradually migrate toward FTTH. The speed of migration will be determined by a number of factors including the level of success to be achieved with DOCSIS 3.1, starting in 2016. With D-CCAP, the HFC network is optimized down to two “forever” network elements: OLT and Ethernet Node. These two network elements are the basic building blocks of the access network of the future, and provide a stable platform for the virtualization of access network.

    In this paper, the D-CCAP solution is first defined, followed by the introduction of a Software-defined Cable Access Network (SDCAN) concept, which is designed to transform DAA into a simple, agile, elastic, and value-added access network, fulfilling the vision of rapid innovation and faster service delivery.

    Symantec Mobility Suite Video
    Information Resources  | 
    9/26/2014  | 
    Introducing the new Symantec Mobility Suite, designed to keep your mobile workforce connected, secure and productive.
    F5 Infographic: Addressing Security Challenges with LTE
    Information Resources  | 
    9/23/2014  | 
    With more IP connectivity, more traffic, more bandwidth, more applications and new protocols like SIP and diameter, LTE provides a host of new security challenges and for mobile operators. Among the tools for dealing with it are better leveraging of security policy and service chaining. Check out F5’s infographic below for a snapshot of new LTE security challenges and how to address them.
    Page 1 / 2   >   >>

    Flash Poll
    From The Founder
    It's clear to me that the communications industry is divided into two types of people, and only one is living in the real world.
    LRTV Documentaries
    Paul Bunyan's Giant Gigabit Plans

    12|22|14   |   03:26   |   (0) comments

    Gary Johnson, the CEO and GM of Minnesota rural operator Paul Bunyan Communications, discusses the company's 5,000-square-mile gigabit network rollout.
    LRTV Interviews
    CenturyLink: Building the Case for NFV

    12|19|14   |   02:14   |   (0) comments

    At the 2020 Vision Executive Summit, James Feger, VP, Network Strategy & Development at CenturyLink, talks about how the US operator is approaching virtual network functions from an operational and business case perspective.
    LRTV Interviews
    Liberty Global Sees Business Goldmine

    12|18|14   |     |   (0) comments

    Steen Sorensen, VP of business services for Liberty Global, explains where the giant international MSO sees growth potential.
    LRTV Documentaries
    EE: The Road to 5G

    12|16|14   |   16:02   |   (1) comment

    Andy Sutton, the principal network architect at UK mobile operator EE, explains how his company is using Wembley stadium as a wireless test bed and how that's helping EE to plan the evolution to 5G.
    LRTV Huawei Video Resource Center
    Highlights of Huawei's NFV Open Cloud Forum 2014

    12|16|14   |     |   (0) comments

    Huawei hosted its inaugural NFV Open Cloud Forum during the SDN & OpenFlow World Congress 2014 in Düsseldorf, Germany. The Forum brought together technology thought leaders, senior executives and telecom professionals from global carriers, industry associations, as well as other partner companies in the ecosystem, to exchange views on and collectively explore how ...
    LRTV Custom TV
    Realizing Operators' Digital Vision

    12|16|14   |   5:23   |   (0) comments

    Leveraging technology is fundamental to digital transformation but understanding customers and serving them really well is at the heart of digital businesses. TM Forum lists the following as the strategic pillars of the digital business: business agility and rapid innovation, operational agility and effectiveness, IT and data centricity, plus customer centricity. ...
    LRTV Documentaries
    US Cellular Injects Analytics Into LTE

    12|16|14   |   2:57   |   (1) comment

    US Cellular's Mario Vela explains how the operator uses analytics for network planning and what comes next as the carrier looks to eke more value out of its metrics.
    LRTV Interviews
    How Cox Biz Plans to Keep Growing

    12|15|14   |     |   (2) comments

    Steve Rowley, SVP of Cox Business, details how the third-biggest US MSO intends to boost its revenues to $2 billion and beyond over the rest of the decade
    LRTV Huawei Video Resource Center
    Interview With Bill Zhang, Director of SoftCOM Product Management, Huawei

    12|15|14   |   2:50   |   (0) comments

    Bill Zhang elaborated on Huawei's open philosophy in NFV solution development and network architecture design at the SDN & OpenFlow World Congress 2014.
    LRTV Huawei Video Resource Center
    Event Highlights: Huawei at SDN & OpenFlow World Congress 2014

    12|15|14   |   3:43   |   (0) comments

    Huawei joined the 2014 SDN & OpenFlow Congress as one of the key sponsors and contributors. At the event, Huawei reinforced the openness and flexibility of its network infrastructure strategies, and provided updates on its SDN and NVF innovations. Through participations at the exhibitions, forums and speeches, Huawei encouraged the industry to "think bigger and ...
    LRTV Interviews
    How Cable Biz Services Hit $10B Mark

    12|12|14   |     |   (1) comment

    Cable operators reached $10 billion in annual business services revenues by delving deeper into their vertical markets and expanding beyond the smallest firms.
    LRTV Documentaries
    Mediacom Aims to Test Connected Tractors

    12|11|14   |   05:07   |   (3) comments

    Cable business service provider is taking its services to the 'agribusiness' sector in partnership with farm equipment specialist John Deere and is getting involved in Gigabit Cities developments.
    Upcoming Live Events
    February 10, 2015, The Westin Peachtree Plaza, Atlanta, GA
    March 17, 2015, The Cable Center, Denver, CO
    April 14, 2015, The Westin Times Square, New York City, NY
    May 6, 2015, McCormick Convention Center, Chicago, IL
    May 13-14, 2015, The Westin Peachtree, Atlanta, GA
    June 9-10, 2015, Chicago, IL
    Hot Topics
    T-Mobile, BlackBerry Flirt With Reuniting
    Sarah Reedy, Senior Editor, 12/17/2014
    1-Gig: Coming to a Small Town Near You
    Jason Meyers, Senior Editor, Gigabit Cities/IoT, 12/17/2014
    Comcast Launches 4K Streaming Service
    Alan Breznick, Cable/Video Practice Leader, 12/18/2014
    US Carriers, You're Going to Cuba!
    Mitch Wagner, West Coast Bureau Chief, Light Reading, 12/18/2014
    Google Steering Android Towards Cars – Report
    Dan Jones, Mobile Editor, 12/19/2014
    Like Us on Facebook
    Twitter Feed
    Webinar Archive