x
Information Resources Latest Content View Content By Month
Enabling Business and Operations Excellence for a Better Connected World
Information Resources | 9/30/2014

From September 15th to 17th, 2014, Huawei held the first Global Professional Services Forum under the theme of "Enabling Business and Operations Excellence" in London. This event attracted over 200 guests, including global operators, Internet companies, industry organizations, and analyst institutions. Dr. Howard Liang, Huawei Senior VP and President of Global Technical Service, delivered a keynote speech at the forum.

Distributed NFV Will Depend on Adaptable Orchestration Framework for Seamless Service Fulfillment – by Heavy Reading
Information Resources | 9/29/2014

Service providers have long struggled to control operational costs and increase the speed of service delivery. Incremental networking technology cost reduction and marginal service delivery improvements have not led to dramatic cost savings or improved time to service launch. In fact, the exponential growth of function-specific networking devices in the past decade made matters worse.

Platforms for Accelerating the Virtual Infrastructure by Heavy Reading
Information Resources | 9/19/2014

This white paper explores the requirements for delivering line-speed performance in a virtual infrastructure environment and reviews an exciting solution to this challenge that is based on a 2U rack-mount chassis with four Intel Xeon E5-4600 v2 series processors, with up to 12 cores per processor, and integrated support for up to 640 Gbit/s of I/O bandwidth.

HUAWEI SmartCare® - Helps Sunrise Improve Network Quality
Information Resources | 9/18/2014

For the fifth consecutive time, Connect, the biggest telecommunications magazine in Europe performed the largest network performance test in Switzerland. Competition in the Swiss telecom market is fierce and good service quality is a key to winning the competition. In 2011 and 2012, Sunrise, the largest private telecom operator in Switzerland, ranked third among the Swiss telecom operators in the Connect network quality test evaluations, and was rated as "satisfactory".

Cisco Evolved Programmable Network: Enabling the Shift to New Business Models
Information Resources | 9/15/2014

Virtualization of network functions is an approach that has been successfully implemented in the data center, and service providers are now trying to improve flexibility and service agility and significantly transform their economic cost models. Service provider-centric software capabilities for operations and services automation are also required to accelerate and monetize the creation of new services.

Cisco Network Convergence System: Building the Foundation for the Internet of Everything
Information Resources | 9/15/2014

A third wave of Internet expansion, the Internet of Everything (IoE), is expected to come through the confluence of people, processes, data, and things. Cisco estimates the Value at Stake for the IoE is $14.4 trillion over the next 10 years. IoE requires a context-intelligent architecture in addition to massive scale. For IoE, service providers must deliver increasing security, reliability, and availability with networks that also provide greater service velocity and flexibility.

Can Software-Defined Networking (SDN) Enhance Operator Monetization?
Information Resources | 9/15/2014

Software-Defined Networking (SDN) is generating a lot of excitement, primarily as a way to simplify networking. It comes to the industry at a time when growing demand, greater service diversity, and increasing infrastructure complexity have challenged the ability of network operators to turn up and take down services quickly.

Rewriting the Book on Mobile Fraud with Hadoop, Accumulo, and Petabyte-Scale Machine Learning
Information Resources | 9/12/2014

The NSA has pioneered data ingestion techniques and analytics at a scale previously unheard of, at both a national and international level. Facebook allows its users to interactively query petabytes of data, and it has also pioneered fraud detection to protect its users by checking 25 billion read and write actions every day. Moving from limited monitoring to "measuring everything" is the accepted way of detecting anomalous behavior at companies such as Facebook, Twitter, and Etsy.

Accelerating NFV Though Common Extensions to NFV Infrastructure & NFVI Management
Information Resources | 9/11/2014

Telefonica, one of the main supporters and adopters of network functions virtualization (NFV), believes the full benefits of functions virtualization can only be gained if the industry can agree on a common NFV infrastructure (NFVI) and Virtualized Infrastructure Manager (VIM). This white paper, written by Heavy Reading's Caroline Chappell, explains the challenges and requirements associated with the development and adoption of a common NFVI and VIM.

Huawei Optical Innovation Forum - Event Summary from Nice, France
Information Resources | 9/4/2014

On June 23rd, more than 170 attendees from network operators, service providers, analyst firms and component companies from around the world convened in Nice for the inaugural Optical Innovation Forum, including Telecom Italia, Telefonica, NTT, JDSU, OVUM and Current Analysis.

Criteria for Advanced Malware Protection Buyers Guide
Information Resources | 9/2/2014

It's no secret that today's advanced attackers have the resources, expertise, and persistence to compromise any organization at any time. Malware is pervasive. Traditional defenses, including firewalls and endpoint protection, are no longer effective against these attacks, which means that the process of handling malware must evolve, and quickly at that.

Email Security Using Cisco ESA - Technology Design Guide
Information Resources | 9/2/2014

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.

Cisco 2014 Mid-Year Security Report
Information Resources | 9/2/2014

Any cyberattack, large or small, is born from a weak link in the security chain. Weak links can take many forms: outdated software, poorly written code, an abandoned website, developer errors, a user who blindly trusts. Adversaries are committed to finding these weak links, one and all, and using them to their full advantage.

Web Security Using Cisco WSA - Technology Design Guide
Information Resources | 9/2/2014

Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.

HOME
Sign In
SEARCH
CLOSE
MORE
CLOSE