& cplSiteName &
Information Resources
Content posted in September 2014
Enabling Business and Operations Excellence for a Better Connected World
Information Resources  | 
9/30/2014  | 
From September 15th to 17th, 2014, Huawei held the first Global Professional Services Forum under the theme of "Enabling Business and Operations Excellence" in London. This event attracted over 200 guests, including global operators, Internet companies, industry organizations, and analyst institutions. Dr. Howard Liang, Huawei Senior VP and President of Global Technical Service, delivered a keynote speech at the forum.
Distributed NFV Will Depend on Adaptable Orchestration Framework for Seamless Service Fulfillment – by Heavy Reading
Information Resources  | 
9/29/2014  | 
Service providers have long struggled to control operational costs and increase the speed of service delivery. Incremental networking technology cost reduction and marginal service delivery improvements have not led to dramatic cost savings or improved time to service launch. In fact, the exponential growth of function-specific networking devices in the past decade made matters worse.
Platforms for Accelerating the Virtual Infrastructure by Heavy Reading
Information Resources  | 
9/19/2014  | 

This white paper explores the requirements for delivering line-speed performance in a virtual infrastructure environment and reviews an exciting solution to this challenge that is based on a 2U rack-mount chassis with four Intel Xeon E5-4600 v2 series processors, with up to 12 cores per processor, and integrated support for up to 640 Gbit/s of I/O bandwidth.

HUAWEI SmartCare® - Helps Sunrise Improve Network Quality
Information Resources  | 
9/18/2014  | 
For the fifth consecutive time, Connect, the biggest telecommunications magazine in Europe performed the largest network performance test in Switzerland. Competition in the Swiss telecom market is fierce and good service quality is a key to winning the competition. In 2011 and 2012, Sunrise, the largest private telecom operator in Switzerland, ranked third among the Swiss telecom operators in the Connect network quality test evaluations, and was rated as “satisfactory”.
Cisco Evolved Programmable Network: Enabling the Shift to New Business Models
Information Resources  | 
9/15/2014  | 
Virtualization of network functions is an approach that has been successfully implemented in the data center, and service providers are now trying to improve flexibility and service agility and significantly transform their economic cost models. Service provider-centric software capabilities for operations and services automation are also required to accelerate and monetize the creation of new services.
Cisco Network Convergence System: Building the Foundation for the Internet of Everything
Information Resources  | 
9/15/2014  | 
A third wave of Internet expansion, the Internet of Everything (IoE), is expected to come through the confluence of people, processes, data, and things. Cisco estimates the Value at Stake for the IoE is $14.4 trillion over the next 10 years. IoE requires a context-intelligent architecture in addition to massive scale. For IoE, service providers must deliver increasing security, reliability, and availability with networks that also provide greater service velocity and flexibility.
Can Software-Defined Networking (SDN) Enhance Operator Monetization?
Information Resources  | 
9/15/2014  | 
Software-Defined Networking (SDN) is generating a lot of excitement, primarily as a way to simplify networking. It comes to the industry at a time when growing demand, greater service diversity, and increasing infrastructure complexity have challenged the ability of network operators to turn up and take down services quickly.
Rewriting the Book on Mobile Fraud with Hadoop, Accumulo, and Petabyte-Scale Machine Learning
Information Resources  | 
9/12/2014  | 
The NSA has pioneered data ingestion techniques and analytics at a scale previously unheard of, at both a national and international level. Facebook allows its users to interactively query petabytes of data, and it has also pioneered fraud detection to protect its users by checking 25 billion read and write actions every day. Moving from limited monitoring to “measuring everything” is the accepted way of detecting anomalous behavior at companies such as Facebook, Twitter, and Etsy.
Accelerating NFV Though Common Extensions to NFV Infrastructure & NFVI Management
Information Resources  | 
9/11/2014  | 
Telefónica, one of the main supporters and adopters of network functions virtualization (NFV), believes the full benefits of functions virtualization can only be gained if the industry can agree on a common NFV infrastructure (NFVI) and Virtualized Infrastructure Manager (VIM). This white paper, written by Heavy Reading’s Caroline Chappell, explains the challenges and requirements associated with the development and adoption of a common NFVI and VIM.
Huawei Optical Innovation Forum - Event Summary from Nice, France
Information Resources  | 
9/4/2014  | 
On June 23rd, more than 170 attendees from network operators, service providers, analyst firms and component companies from around the world convened in Nice for the inaugural Optical Innovation Forum, including Telecom Italia, Telefonica, NTT, JDSU, OVUM and Current Analysis.
Criteria for Advanced Malware Protection Buyers Guide
Information Resources  | 
9/2/2014  | 
It’s no secret that today’s advanced attackers have the resources, expertise, and persistence to compromise any organization at any time. Malware is pervasive. Traditional defenses, including firewalls and endpoint protection, are no longer effective against these attacks, which means that the process of handling malware must evolve, and quickly at that.
Email Security Using Cisco ESA - Technology Design Guide
Information Resources  | 
9/2/2014  | 
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.
Cisco 2014 Mid-Year Security Report
Information Resources  | 
9/2/2014  | 
Any cyberattack, large or small, is born from a weak link in the security chain. Weak links can take many forms: outdated software, poorly written code, an abandoned website, developer errors, a user who blindly trusts. Adversaries are committed to finding these weak links, one and all, and using them to their full advantage.
Web Security Using Cisco WSA - Technology Design Guide
Information Resources  | 
9/2/2014  | 
Cisco Validated designs (CVds) provide the framework for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each CVd in order to ensure faster, more reliable, and fully predictable deployment.


Featured Video
From The Founder
John Chambers is still as passionate about business and innovation as he ever was at Cisco, finds Steve Saunders.
Flash Poll
Upcoming Live Events
June 26, 2018, Nice, France
September 12, 2018, Los Angeles, CA
September 24-26, 2018, Westin Westminster, Denver
October 9, 2018, The Westin Times Square, New York
October 23, 2018, Georgia World Congress Centre, Atlanta, GA
November 7-8, 2018, London, United Kingdom
November 8, 2018, The Montcalm by Marble Arch, London
November 15, 2018, The Westin Times Square, New York
December 4-6, 2018, Lisbon, Portugal
All Upcoming Live Events
Hot Topics
Telco Job Prospects Go From Bad to Worse
Iain Morris, News Editor, 6/22/2018
Larry Ellison Laughed at the Cloud, Now the Cloud Is Laughing Back
Mitch Wagner, Executive Editor, Light Reading, 6/20/2018
Mavenir's Billion-Dollar Blueprint
Ray Le Maistre, Editor-in-Chief, 6/18/2018
5G Transport – Where Do We Start?
Ray Le Maistre, Editor-in-Chief, 6/21/2018
Animals with Phones
Backing Up Your Work Is Crucial Click Here
Live Digital Audio

A CSP's digital transformation involves so much more than technology. Crucial – and often most challenging – is the cultural transformation that goes along with it. As Sigma's Chief Technology Officer, Catherine Michel has extensive experience with technology as she leads the company's entire product portfolio and strategy. But she's also no stranger to merging technology and culture, having taken a company — Tribold — from inception to acquisition (by Sigma in 2013), and she continues to advise service providers on how to drive their own transformations. This impressive female leader and vocal advocate for other women in the industry will join Women in Comms for a live radio show to discuss all things digital transformation, including the cultural transformation that goes along with it.

Like Us on Facebook
Twitter Feed