& cplSiteName &
Information Resources
Content posted in March 2018
The Antifragile Telco: Assuring the Virtualized Network
Information Resources  | 
3/30/2018  | 
How do you assure and manage the performance of your NFV networks?
Zero-Touch Network-as-a-Service: Leveraging LSO, SDN and NFV
Information Resources  | 
3/30/2018  | 
Accelerate digital transformation while delivering high-value network experience - Zero-Touch Network as a Service: Leveraging LSO, SDN and NFV.
Future- Proof Service Assurance: Automation for 5G & Beyond
Information Resources  | 
3/30/2018  | 
This paper discusses some of the challenges that 5G poses for service assurance and considers how machine learning might be applied to address them. The paper also explores some architectural considerations for service assurance systems, including: the need for service assurance systems to be more closely integrated with fulfillment/ orchestration to deliver closed-loop automation; and more.
How Integrated Photonics Enhances Capacity and Scalability for Fiber Deep Networks
Information Resources  | 
3/21/2018  | 
Cable operators have an aging, fragmented infrastructure that is growing increasingly expensive to maintain and support. At the same time they need to adapt their network to manage increasing demand for capacity and changing consumption models. This paper explores a technical solution that will eliminate out of date equipment, drive content closer to the user and removes capacity constraints. All while allowing an operator to reduce environmental impact and operational costs.
Interoperability Certification: Fulfilling the Promise of NFV
Information Resources  | 
3/21/2018  | 
DNS Threat Intelligence vs. AI Network Security
Information Resources  | 
3/16/2018  | 
In 2-3 years, all DNS traffic will be encrypted. Analyzing DNS traffic will not help to spot and stop malicious activity on the network. It brings numerous challenges to network operators. They can solve them by implementing security measures powered by Artificial Intelligence. This white paper discusses why DNS blacklisting is not an effective security control anymore.
What Limits Us, Inspires Us
Information Resources  | 
3/12/2018  | 
See how the Nokia Photonic Service Engine 3 is taking optical performance to the limit of what’s possible
Taking Light to the Limit
Information Resources  | 
3/12/2018  | 
The Nokia Photonic Service Engine 3 (PSE-3) is the industry’s most advanced coherent digital signal processor (DSP) and powers the latest generation of Nokia wavelength division multiplexing, packet-optical transport, and data center interconnect (DCI) platforms. Supporting probabilistic constellation shaping and high baud rates, the PSE-3 sets new industry benchmarks for optical performance and flexibility. Its novel approach to programmability simplifies network operations and planning.
Taking Light to the Limit- Infographic
Information Resources  | 
3/12/2018  | 
Pioneered by the innovators at Nokia Bell Labs, the trail-blazing Super Coherent PSE-3 chipset is shaping the future of optical networking. Discover the shape of things to come.
Web-Scale Networking for Telcos: The Time Is Now
Information Resources  | 
3/5/2018  | 
Cumulus Networks asserts that its customers have achieved significant capex and opex savings by leveraging the Cumulus Linux open network OS on white box switches. Of these, the opex savings are most notable. Automation reduces provisioning time from weeks to minutes and reduces the number of administrators needed to manage the network.
The Essential Guide to Preparing your Network for Cloud
Information Resources  | 
3/2/2018  | 
Whether you’re supporting SaaS apps, migrating apps to the cloud, creating a hybrid, multi-cloud environment, or just making the Internet available for customers, you need your network to position you for success at every stage of your cloud journey.
How MSSPs can Maximize Revenues with Various Security Service Models
Information Resources  | 
3/2/2018  | 
Enterprise spending on IT security products and services is expected to grow significantly over the next five years, presenting a clear revenue opportunity for managed security service providers (MSSPs). This eBook identifies and describes three basic delivery models that MSSPs can use for their managed security services, focusing on the benefits of deploying a security fabric architecture that can incorporate products from multiple vendors.


Featured Video
Flash Poll
Upcoming Live Events
September 17-19, 2019, Dallas, Texas
October 1, 2019, New Orleans, Louisiana
October 2-22, 2019, Los Angeles, CA
October 10, 2019, New York, New York
November 5, 2019, London, England
November 7, 2019, London, UK
December 3-5, 2019, Vienna, Austria
December 3, 2019, New York, New York
All Upcoming Live Events
Partner Perspectives - content from our sponsors
Transform Beyond Borders to Lead the Innovation
By Ben Zhou, CEO, Whale Cloud
Reject Limits. Build the Future.
By David Wang, Huawei
China Telecom & Huawei Jointly Complete the World's First End-to-End 5G SA Voice & Video Call
By Jay Liu, Senior Marketing Manager, Cloud Core Product Line, Huawei Technologies
All Partner Perspectives