& cplSiteName &
Information Resources
Content posted in September 2014
Enabling Business and Operations Excellence for a Better Connected World
Information Resources  | 
9/30/2014  | 
From September 15th to 17th, 2014, Huawei held the first Global Professional Services Forum under the theme of "Enabling Business and Operations Excellence" in London. This event attracted over 200 guests, including global operators, Internet companies, industry organizations, and analyst institutions. Dr. Howard Liang, Huawei Senior VP and President of Global Technical Service, delivered a keynote speech at the forum.
Distributed NFV Will Depend on Adaptable Orchestration Framework for Seamless Service Fulfillment – by Heavy Reading
Information Resources  | 
9/29/2014  | 
Service providers have long struggled to control operational costs and increase the speed of service delivery. Incremental networking technology cost reduction and marginal service delivery improvements have not led to dramatic cost savings or improved time to service launch. In fact, the exponential growth of function-specific networking devices in the past decade made matters worse.
Platforms for Accelerating the Virtual Infrastructure by Heavy Reading
Information Resources  | 
9/19/2014  | 

This white paper explores the requirements for delivering line-speed performance in a virtual infrastructure environment and reviews an exciting solution to this challenge that is based on a 2U rack-mount chassis with four Intel Xeon E5-4600 v2 series processors, with up to 12 cores per processor, and integrated support for up to 640 Gbit/s of I/O bandwidth.

HUAWEI SmartCare® - Helps Sunrise Improve Network Quality
Information Resources  | 
9/18/2014  | 
For the fifth consecutive time, Connect, the biggest telecommunications magazine in Europe performed the largest network performance test in Switzerland. Competition in the Swiss telecom market is fierce and good service quality is a key to winning the competition. In 2011 and 2012, Sunrise, the largest private telecom operator in Switzerland, ranked third among the Swiss telecom operators in the Connect network quality test evaluations, and was rated as “satisfactory”.
Cisco Evolved Programmable Network: Enabling the Shift to New Business Models
Information Resources  | 
9/15/2014  | 
Virtualization of network functions is an approach that has been successfully implemented in the data center, and service providers are now trying to improve flexibility and service agility and significantly transform their economic cost models. Service provider-centric software capabilities for operations and services automation are also required to accelerate and monetize the creation of new services.
Cisco Network Convergence System: Building the Foundation for the Internet of Everything
Information Resources  | 
9/15/2014  | 
A third wave of Internet expansion, the Internet of Everything (IoE), is expected to come through the confluence of people, processes, data, and things. Cisco estimates the Value at Stake for the IoE is $14.4 trillion over the next 10 years. IoE requires a context-intelligent architecture in addition to massive scale. For IoE, service providers must deliver increasing security, reliability, and availability with networks that also provide greater service velocity and flexibility.
Can Software-Defined Networking (SDN) Enhance Operator Monetization?
Information Resources  | 
9/15/2014  | 
Software-Defined Networking (SDN) is generating a lot of excitement, primarily as a way to simplify networking. It comes to the industry at a time when growing demand, greater service diversity, and increasing infrastructure complexity have challenged the ability of network operators to turn up and take down services quickly.
Rewriting the Book on Mobile Fraud with Hadoop, Accumulo, and Petabyte-Scale Machine Learning
Information Resources  | 
9/12/2014  | 
The NSA has pioneered data ingestion techniques and analytics at a scale previously unheard of, at both a national and international level. Facebook allows its users to interactively query petabytes of data, and it has also pioneered fraud detection to protect its users by checking 25 billion read and write actions every day. Moving from limited monitoring to “measuring everything” is the accepted way of detecting anomalous behavior at companies such as Facebook, Twitter, and Etsy.
Accelerating NFV Though Common Extensions to NFV Infrastructure & NFVI Management
Information Resources  | 
9/11/2014  | 
Telefónica, one of the main supporters and adopters of network functions virtualization (NFV), believes the full benefits of functions virtualization can only be gained if the industry can agree on a common NFV infrastructure (NFVI) and Virtualized Infrastructure Manager (VIM). This white paper, written by Heavy Reading’s Caroline Chappell, explains the challenges and requirements associated with the development and adoption of a common NFVI and VIM.
Huawei Optical Innovation Forum - Event Summary from Nice, France
Information Resources  | 
9/4/2014  | 
On June 23rd, more than 170 attendees from network operators, service providers, analyst firms and component companies from around the world convened in Nice for the inaugural Optical Innovation Forum, including Telecom Italia, Telefonica, NTT, JDSU, OVUM and Current Analysis.
Criteria for Advanced Malware Protection Buyers Guide
Information Resources  | 
9/2/2014  | 
It’s no secret that today’s advanced attackers have the resources, expertise, and persistence to compromise any organization at any time. Malware is pervasive. Traditional defenses, including firewalls and endpoint protection, are no longer effective against these attacks, which means that the process of handling malware must evolve, and quickly at that.
Email Security Using Cisco ESA - Technology Design Guide
Information Resources  | 
9/2/2014  | 
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.
Cisco 2014 Mid-Year Security Report
Information Resources  | 
9/2/2014  | 
Any cyberattack, large or small, is born from a weak link in the security chain. Weak links can take many forms: outdated software, poorly written code, an abandoned website, developer errors, a user who blindly trusts. Adversaries are committed to finding these weak links, one and all, and using them to their full advantage.
Web Security Using Cisco WSA - Technology Design Guide
Information Resources  | 
9/2/2014  | 
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.


Featured Video
From The Founder
Light Reading founder Steve Saunders grills Cisco's Roland Acra on how he's bringing automation to life inside the data center.
Flash Poll
Upcoming Live Events
February 26-28, 2018, Santa Clara Convention Center, CA
March 20-22, 2018, Denver Marriott Tech Center
April 4, 2018, The Westin Dallas Downtown, Dallas
May 14-17, 2018, Austin Convention Center
All Upcoming Live Events
Infographics
SmartNICs aren't just about achieving scale. They also have a major impact in reducing CAPEX and OPEX requirements.
Hot Topics
Here's Pai in Your Eye
Alan Breznick, Cable/Video Practice Leader, Light Reading, 12/11/2017
Ericsson & Samsung to Supply Verizon With Fixed 5G Gear
Dan Jones, Mobile Editor, 12/11/2017
Verizon's New Fios TV Is No More
Mari Silbey, Senior Editor, Cable/Video, 12/12/2017
Juniper Turns Contrail Into a Platform for Multicloud
Craig Matsumoto, Editor-in-Chief, Light Reading, 12/12/2017
Cloudy With a Chance of Automation: Telecom in 2018
Iain Morris, News Editor, 12/12/2017
Animals with Phones
Don't Fall Asleep on the Job! Click Here
Live Digital Audio

Understanding the full experience of women in technology requires starting at the collegiate level (or sooner) and studying the technologies women are involved with, company cultures they're part of and personal experiences of individuals.

During this WiC radio show, we will talk with Nicole Engelbert, the director of Research & Analysis for Ovum Technology and a 23-year telecom industry veteran, about her experiences and perspectives on women in tech. Engelbert covers infrastructure, applications and industries for Ovum, but she is also involved in the research firm's higher education team and has helped colleges and universities globally leverage technology as a strategy for improving recruitment, retention and graduation performance.

She will share her unique insight into the collegiate level, where women pursuing engineering and STEM-related degrees is dwindling. Engelbert will also reveal new, original Ovum research on the topics of artificial intelligence, the Internet of Things, security and augmented reality, as well as discuss what each of those technologies might mean for women in our field. As always, we'll also leave plenty of time to answer all your questions live on the air and chat board.

Like Us on Facebook
Twitter Feed