This document discusses how communications service providers can generate new revenue streams by offering virtualized network services using SDN and NFV technologies. It makes three key points:
1) SDN and NFV allow CSPs to offer customized, on-demand network services that can be provisioned in minutes rather than days or weeks, giving customers more flexibility and generating new revenue from services.
2) Edge computing services that have low latency requirements, such as gaming, IoT and smart cities, can benefit from an "edge cloud" model where computing is done locally rather than in centralized data centers. Transport NFV can help deliver these edge services.
3) Synergies between dynamic SDN/NFV-
The document promotes ElastiNET, a solution from ECI for service providers and research networks. ElastiNET provides an elastic network that allows quick adaptation to changing market and customer needs. It features supreme service elasticity through capabilities like real-time network control, fast introduction of new services, and seamless multi-vendor interoperability. ElastiNET guarantees end-user experience while reducing total cost of ownership.
The document introduces ElastiCLOUD, a solution from ECI Telecom for elastic cloud networking. It discusses how today's networks need to be able to quickly adapt to changing technology, customers, and industries. ElastiCLOUD provides high performance, secure connectivity for cloud, storage area network, and data center applications. It uses software-defined networking and network function virtualization to offer flexible, cost-efficient cloud networking capabilities.
1) The document discusses new revenue opportunities for service providers in the cloud market through offering flexible networking as a service (NaaS) and security as a service (SECaaS).
2) It notes that while cloud provides business flexibility, the network flexibility does not always match and security is a top concern inhibiting cloud adoption.
3) The document proposes that service providers introduce NaaS services now to offer on-demand bandwidth and scheduled services, and SECaaS through security on demand and centralized management of multiple security services.
This document discusses ECI's work with ONF's ONOS SDN controller to drive open standards in telecommunications networking. It begins by describing the current industry as having vendor lock-in, high costs, limited interoperability, and closed systems. It then outlines a future with seamless ecosystems, virtualization, programmability, and lifecycle orchestration. ECI is effectively bridging the gap between the current and future states by working with ONOS through open source contributions to promote openness. Specific contributions include new optical use cases in ODU multiplexing and cross-connecting, as well as enhancements to ONOS' core information model, intents, and protocols.
This document discusses the need for carrier cooperation and LSO (Lifecycle Service Orchestration) to enable fast provisioning of services from minutes to months. It outlines how global connectivity used to be provisioned in minutes through carrier cooperation but deregulation and new technologies led to fragmented networks. The alternative proposed is defining network slice services and using LSO to automate cross-carrier provisioning through standard APIs. This would allow services like a 2GB L3VPN to be provisioned within minutes across multiple carriers instead of months.
This document discusses how emerging technologies are driving changes in networking and opportunities for network providers. It covers how the cloud, internet of things, security concerns, and software-defined networking are impacting network design and provision of services. The cloud is increasing bandwidth demands and changing traffic patterns. The internet of things is connecting more devices and data sources. Security is more complex with open networks. Software-defined networking allows more flexible provisioning of network services and connectivity to clouds. These forces provide opportunities for network operators to offer new services that enable elastic, efficient, open, and secure networks.
This document discusses network function virtualization (NFV) from the data center to the wide area network (WAN). It addresses moving NFV beyond data centers to the network edge in order to reduce latency, limit tromboning effects, and provide a platform for edge computing services. Key considerations for deploying virtualized network functions (VNFs) at the edge include link security, latency from tromboning, and performance requirements that vary by function. The document proposes approaches like NFV acceleration and hyper-converged edge clouds to address these issues and better support distributed edge deployment of VNFs.
The document promotes ElastiNET, a solution from ECI for service providers and research networks. ElastiNET provides an elastic network that allows quick adaptation to changing market and customer needs. It features supreme service elasticity through capabilities like real-time network control, fast introduction of new services, and seamless multi-vendor interoperability. ElastiNET guarantees end-user experience while reducing total cost of ownership.
The document introduces ElastiCLOUD, a solution from ECI Telecom for elastic cloud networking. It discusses how today's networks need to be able to quickly adapt to changing technology, customers, and industries. ElastiCLOUD provides high performance, secure connectivity for cloud, storage area network, and data center applications. It uses software-defined networking and network function virtualization to offer flexible, cost-efficient cloud networking capabilities.
1) The document discusses new revenue opportunities for service providers in the cloud market through offering flexible networking as a service (NaaS) and security as a service (SECaaS).
2) It notes that while cloud provides business flexibility, the network flexibility does not always match and security is a top concern inhibiting cloud adoption.
3) The document proposes that service providers introduce NaaS services now to offer on-demand bandwidth and scheduled services, and SECaaS through security on demand and centralized management of multiple security services.
This document discusses ECI's work with ONF's ONOS SDN controller to drive open standards in telecommunications networking. It begins by describing the current industry as having vendor lock-in, high costs, limited interoperability, and closed systems. It then outlines a future with seamless ecosystems, virtualization, programmability, and lifecycle orchestration. ECI is effectively bridging the gap between the current and future states by working with ONOS through open source contributions to promote openness. Specific contributions include new optical use cases in ODU multiplexing and cross-connecting, as well as enhancements to ONOS' core information model, intents, and protocols.
This document discusses the need for carrier cooperation and LSO (Lifecycle Service Orchestration) to enable fast provisioning of services from minutes to months. It outlines how global connectivity used to be provisioned in minutes through carrier cooperation but deregulation and new technologies led to fragmented networks. The alternative proposed is defining network slice services and using LSO to automate cross-carrier provisioning through standard APIs. This would allow services like a 2GB L3VPN to be provisioned within minutes across multiple carriers instead of months.
This document discusses how emerging technologies are driving changes in networking and opportunities for network providers. It covers how the cloud, internet of things, security concerns, and software-defined networking are impacting network design and provision of services. The cloud is increasing bandwidth demands and changing traffic patterns. The internet of things is connecting more devices and data sources. Security is more complex with open networks. Software-defined networking allows more flexible provisioning of network services and connectivity to clouds. These forces provide opportunities for network operators to offer new services that enable elastic, efficient, open, and secure networks.
This document discusses network function virtualization (NFV) from the data center to the wide area network (WAN). It addresses moving NFV beyond data centers to the network edge in order to reduce latency, limit tromboning effects, and provide a platform for edge computing services. Key considerations for deploying virtualized network functions (VNFs) at the edge include link security, latency from tromboning, and performance requirements that vary by function. The document proposes approaches like NFV acceleration and hyper-converged edge clouds to address these issues and better support distributed edge deployment of VNFs.
- The document proposes adding stateful capabilities to OpenFlow 2.0 in order to better support use cases that require stateful processing like APS and load balancing.
- It suggests including a stateful flow table, programmable state machines, and the ability to generate and process frames within OpenFlow switches.
- To ensure interoperability, it recommends adopting a bytecode approach where any programming language could be used to define state machines which are then compiled to a common bytecode format and run on switches from different vendors.
Multilayer optimization deals with projected traffic demands of each type of service traffic, by constructing and analyzing different combinations for handling traffic across the transport layers to end up with a whole that is much less than the sum of the parts.
Moreover, when combined with centralized SDN control it promises to be a platform for innovative services that generate new revenue streams. While the payoffs are huge, SDN-controlled multilayer-optimized networks are not trivial.
There is a rocket science element to the underlying algorithms, and this increases in complexity when combined with real time control.
The presentation will discuss the motivations, benefits, and approaches, for SDN-controlled, multilayer optimized networks.
This document discusses the transition from TDM networks to packet-based networks, focusing on MPLS-TP as the best solution for mission critical applications. It notes that MPLS-TP can guarantee TDM-like deterministic performance for any network topology while providing packet efficiency. It also highlights that MPLS-TP offers transport-like protection, operation, and OAM that are important for low latency, jitter, and accurate timing in applications like teleprotection and synchronization. The document argues that MPLS-TP minimizes risk for mission critical networks during the inevitable change from TDM to packet.
This document discusses the value of MPLS-TP for utility networks. It begins with an introduction of ECI, an expert in telecommunications solutions. It then discusses the transition from TDM to packet-based networks for utilities and the key challenges in maintaining strict service requirements. MPLS-TP is presented as a solution, combining the efficiency of packet networks with the predictable performance of TDM. MPLS-TP retains key aspects of MPLS while adding transport-grade operations. It provides deterministic performance for applications like teleprotection and synchronization. Overall, the document argues that MPLS-TP is well-suited for mission critical utility applications by enabling a risk-free transition to packet-based networks with TDM-grade reliability
Alcatel-Lucent Cloud: Shaping the Future NFV OSS David Amzallag TM Forum 2013Alcatel-Lucent Cloud
Communication service providers have started to re-think the network with the objective to remove the walls between network services and network infrastructure, reduce expenditures and to achieve network elasticity and scalability. This new vision aims to change the way telcos are building and managing their networks and spans Software Defined Networking (SDN) as well as Network Functions Virtualization (NFV). As many network services will be comprised of virtualized network functions together with non-virtualized network functions, the expectations for a new operational model are including, among others, a real-time, zero-touch and fully programmable OSS that will share responsibilities with legacy OSS, Cloud Management/ Orchestration System, SDN Controllers and a new OSS for Applications. Follow David Amzallag on twitter @david_amzallag
This document discusses how communication service providers can leverage edge cloud computing and virtualized transport (T-NFV) to offer new services and generate additional revenue streams. It notes that many emerging services are moving to or being created in the cloud but require communications connectivity. Edge cloud computing addresses this by situating services closer to end users with lower latency requirements. The document outlines how T-NFV can virtualize transport functions to enable fast, automated delivery of edge cloud services while differentiating the CSP. This virtualized transport is presented as key to enabling edge computing opportunities across sectors like IoT, smart cities, healthcare and more.
This document discusses smart cities and ECI's solutions for them. It first provides an overview of Gartner and Frost & Sullivan's views that the global smart cities market will reach $1.5 trillion by 2020. It then outlines various smart city applications like pollution monitoring, education, transportation, security, and health. The document presents ECI's smart city framework and typical topology with network, application and security layers. It positions ECI as a one-stop shop that provides elastic wireless, cyber, and security solutions from sensors to support.
NPT, ECI’s MPLS-TP based packet transport solution for Packet Transport Networks, is about putting first things first: Lowest Cost with Improved Performance.
Peter Coppens, VP Product, presentation from Layer 123 SDN NFV World Congress in the Hague, October 2017. SD WAN benefits and caveats from real use cases.
This document discusses Colt's On Demand network and services. It summarizes that Colt has transformed its services from end-to-end products to modular components that customers can use to build their own services. Customers can now reserve ports, create connections, and modify bandwidth in real time through a portal or API. The document also outlines new capabilities like SDN federation across domains, programmable optical SDN, a unified NFV architecture, and using AI/ML for intelligent networking functions.
Case Studies on Telecom Open Source, Paul Drew, Metaswitch NetworksAlan Quayle
Case Studies on Telecom Open Source
Presented at TADSummit 17th November 2015
Paul Drew
GM, Open Source Business Unit
Metaswitch Networks
Kevin Paige
CTO & Director of Customer Services Manx Telecom
Since last year when we demonstrated "IMS in Minutes" at TADHack, we've seen tier 1 customers around the world ramp up their adoption of open source software in the core of their network. We'll share several case studies on what Metaswitch Networks and our customers have achieved and the impact on their business.
VNF (Virtual Network Function) testing and “validation” as a network service for providers. NFV provides opportunities for providers to decrease time to market for new services and save money when rolling out an and managing the services. This will show a solution allowing providers to bring in VNFs and provide a flexible testing and validation framework.
This document discusses 5 trends enabled by 5G technology: distributed cloud, Internet of Things (IoT), artificial intelligence (AI), virtual reality (VR), and augmented reality (AR). It describes how each trend will require high-speed, low-latency networks with network automation. A distributed cloud architecture is needed to place computing resources at the edge of the network to meet latency and mobility requirements of these new applications. Open source networking and standardization will be important to realize this vision.
Telefonica innovation edge computing and servicesPatrick Lopez
This document discusses using edge computing to create unique customer experiences. It describes using software to adapt networks to customers rather than vice versa. Edge computing can enable personalization, support 5G services that require low latency, and provide a coherent experience across cellular and fixed networks. The document outlines plans to transform Telefonica's central office infrastructure into a programmable edge platform using virtualization. This will improve customer experience and allow third parties to develop edge services. Examples of potential edge services discussed include content delivery, augmented reality, drone video delivery, and serverless computing.
Colt is evolving its VPN portfolio towards a hybrid of MPLS and SD WAN to address customer challenges around needs for higher bandwidth, faster network delivery, and more network agility. It is initially focusing on an SD WAN minimum viable product to directly address new market demand. Longer term, Colt aims to develop a unified, automated on-demand platform powered by network virtualization, orchestration, and artificial intelligence to further optimize services.
This document provides a summary of Colt's evolution from MPLS to cloud networking. It discusses Colt's transformation to deliver services via software-defined networking and network functions virtualization technologies. This allows services to be provisioned in minutes rather than days and offers dynamic, pay-as-you-use commercial models. Colt is developing platforms like Novitas for network orchestration and Stratus for network virtualization to enable its On Demand services and automation. Future initiatives involve using artificial intelligence for closed-loop automation and intelligent service management.
Tuning Solr and its Pipeline for Logs: Presented by Rafał Kuć & Radu Gheorghe...Lucidworks
The document summarizes key points from a presentation on optimizing Solr and log pipelines for time-series data. The presentation covered using time-based Solr collections that rotate based on size, tiering hot and cold clusters, tuning OS and Solr settings, parsing logs, buffering pipelines, and shipping logs using protocols like UDP, TCP, and Kafka. The overall conclusions were that tuning segments per tier and max merged segment size improved indexing throughput, and that simple, reliable pipelines like Filebeat to Kafka or rsyslog over UNIX sockets generally work best.
- The document proposes adding stateful capabilities to OpenFlow 2.0 in order to better support use cases that require stateful processing like APS and load balancing.
- It suggests including a stateful flow table, programmable state machines, and the ability to generate and process frames within OpenFlow switches.
- To ensure interoperability, it recommends adopting a bytecode approach where any programming language could be used to define state machines which are then compiled to a common bytecode format and run on switches from different vendors.
Multilayer optimization deals with projected traffic demands of each type of service traffic, by constructing and analyzing different combinations for handling traffic across the transport layers to end up with a whole that is much less than the sum of the parts.
Moreover, when combined with centralized SDN control it promises to be a platform for innovative services that generate new revenue streams. While the payoffs are huge, SDN-controlled multilayer-optimized networks are not trivial.
There is a rocket science element to the underlying algorithms, and this increases in complexity when combined with real time control.
The presentation will discuss the motivations, benefits, and approaches, for SDN-controlled, multilayer optimized networks.
This document discusses the transition from TDM networks to packet-based networks, focusing on MPLS-TP as the best solution for mission critical applications. It notes that MPLS-TP can guarantee TDM-like deterministic performance for any network topology while providing packet efficiency. It also highlights that MPLS-TP offers transport-like protection, operation, and OAM that are important for low latency, jitter, and accurate timing in applications like teleprotection and synchronization. The document argues that MPLS-TP minimizes risk for mission critical networks during the inevitable change from TDM to packet.
This document discusses the value of MPLS-TP for utility networks. It begins with an introduction of ECI, an expert in telecommunications solutions. It then discusses the transition from TDM to packet-based networks for utilities and the key challenges in maintaining strict service requirements. MPLS-TP is presented as a solution, combining the efficiency of packet networks with the predictable performance of TDM. MPLS-TP retains key aspects of MPLS while adding transport-grade operations. It provides deterministic performance for applications like teleprotection and synchronization. Overall, the document argues that MPLS-TP is well-suited for mission critical utility applications by enabling a risk-free transition to packet-based networks with TDM-grade reliability
Alcatel-Lucent Cloud: Shaping the Future NFV OSS David Amzallag TM Forum 2013Alcatel-Lucent Cloud
Communication service providers have started to re-think the network with the objective to remove the walls between network services and network infrastructure, reduce expenditures and to achieve network elasticity and scalability. This new vision aims to change the way telcos are building and managing their networks and spans Software Defined Networking (SDN) as well as Network Functions Virtualization (NFV). As many network services will be comprised of virtualized network functions together with non-virtualized network functions, the expectations for a new operational model are including, among others, a real-time, zero-touch and fully programmable OSS that will share responsibilities with legacy OSS, Cloud Management/ Orchestration System, SDN Controllers and a new OSS for Applications. Follow David Amzallag on twitter @david_amzallag
This document discusses how communication service providers can leverage edge cloud computing and virtualized transport (T-NFV) to offer new services and generate additional revenue streams. It notes that many emerging services are moving to or being created in the cloud but require communications connectivity. Edge cloud computing addresses this by situating services closer to end users with lower latency requirements. The document outlines how T-NFV can virtualize transport functions to enable fast, automated delivery of edge cloud services while differentiating the CSP. This virtualized transport is presented as key to enabling edge computing opportunities across sectors like IoT, smart cities, healthcare and more.
This document discusses smart cities and ECI's solutions for them. It first provides an overview of Gartner and Frost & Sullivan's views that the global smart cities market will reach $1.5 trillion by 2020. It then outlines various smart city applications like pollution monitoring, education, transportation, security, and health. The document presents ECI's smart city framework and typical topology with network, application and security layers. It positions ECI as a one-stop shop that provides elastic wireless, cyber, and security solutions from sensors to support.
NPT, ECI’s MPLS-TP based packet transport solution for Packet Transport Networks, is about putting first things first: Lowest Cost with Improved Performance.
Peter Coppens, VP Product, presentation from Layer 123 SDN NFV World Congress in the Hague, October 2017. SD WAN benefits and caveats from real use cases.
This document discusses Colt's On Demand network and services. It summarizes that Colt has transformed its services from end-to-end products to modular components that customers can use to build their own services. Customers can now reserve ports, create connections, and modify bandwidth in real time through a portal or API. The document also outlines new capabilities like SDN federation across domains, programmable optical SDN, a unified NFV architecture, and using AI/ML for intelligent networking functions.
Case Studies on Telecom Open Source, Paul Drew, Metaswitch NetworksAlan Quayle
Case Studies on Telecom Open Source
Presented at TADSummit 17th November 2015
Paul Drew
GM, Open Source Business Unit
Metaswitch Networks
Kevin Paige
CTO & Director of Customer Services Manx Telecom
Since last year when we demonstrated "IMS in Minutes" at TADHack, we've seen tier 1 customers around the world ramp up their adoption of open source software in the core of their network. We'll share several case studies on what Metaswitch Networks and our customers have achieved and the impact on their business.
VNF (Virtual Network Function) testing and “validation” as a network service for providers. NFV provides opportunities for providers to decrease time to market for new services and save money when rolling out an and managing the services. This will show a solution allowing providers to bring in VNFs and provide a flexible testing and validation framework.
This document discusses 5 trends enabled by 5G technology: distributed cloud, Internet of Things (IoT), artificial intelligence (AI), virtual reality (VR), and augmented reality (AR). It describes how each trend will require high-speed, low-latency networks with network automation. A distributed cloud architecture is needed to place computing resources at the edge of the network to meet latency and mobility requirements of these new applications. Open source networking and standardization will be important to realize this vision.
Telefonica innovation edge computing and servicesPatrick Lopez
This document discusses using edge computing to create unique customer experiences. It describes using software to adapt networks to customers rather than vice versa. Edge computing can enable personalization, support 5G services that require low latency, and provide a coherent experience across cellular and fixed networks. The document outlines plans to transform Telefonica's central office infrastructure into a programmable edge platform using virtualization. This will improve customer experience and allow third parties to develop edge services. Examples of potential edge services discussed include content delivery, augmented reality, drone video delivery, and serverless computing.
Colt is evolving its VPN portfolio towards a hybrid of MPLS and SD WAN to address customer challenges around needs for higher bandwidth, faster network delivery, and more network agility. It is initially focusing on an SD WAN minimum viable product to directly address new market demand. Longer term, Colt aims to develop a unified, automated on-demand platform powered by network virtualization, orchestration, and artificial intelligence to further optimize services.
This document provides a summary of Colt's evolution from MPLS to cloud networking. It discusses Colt's transformation to deliver services via software-defined networking and network functions virtualization technologies. This allows services to be provisioned in minutes rather than days and offers dynamic, pay-as-you-use commercial models. Colt is developing platforms like Novitas for network orchestration and Stratus for network virtualization to enable its On Demand services and automation. Future initiatives involve using artificial intelligence for closed-loop automation and intelligent service management.
Tuning Solr and its Pipeline for Logs: Presented by Rafał Kuć & Radu Gheorghe...Lucidworks
The document summarizes key points from a presentation on optimizing Solr and log pipelines for time-series data. The presentation covered using time-based Solr collections that rotate based on size, tiering hot and cold clusters, tuning OS and Solr settings, parsing logs, buffering pipelines, and shipping logs using protocols like UDP, TCP, and Kafka. The overall conclusions were that tuning segments per tier and max merged segment size improved indexing throughput, and that simple, reliable pipelines like Filebeat to Kafka or rsyslog over UNIX sockets generally work best.
This document provides guidance on how to securely manage private email. It recommends:
1) Protecting email data by hosting it on a private server or dedicated virtual machine to isolate it from multi-tenant environments and avoid brute force and DDoS attacks.
2) Monitoring email data through log analytics and server monitoring to detect unwanted activity and ensure delivery.
3) Mastering email security by implementing two-factor authentication, regular penetration tests, backup procedures, and access controls like blacklisting and whitelisting.
Cloud Security Monitoring at Auth0 - Security BSides SeattleEugene Kogan
The slides from Eugene Kogan's talk on cloud security monitoring at Auth0, presented at Security BSides Seattle, 2017. More details at our blog: https://auth0.engineering/cloud-security-monitoring-at-auth0-ff5e87ad1141
Oracle OpenWorld - A quick take on all 22 press releases of Day #1 - #3Holger Mueller
Take a look at Constellation Research Analyst Holger Mueller walking through all 22 Oracle OpenWorld pres releases - capturing Day #1 till Day #3 - and ongoing in San Francisco.
(BDT306) Mission-Critical Stream Processing with Amazon EMR and Amazon Kinesi...Amazon Web Services
Organizations processing mission critical high-volume data must be able to achieve high levels of throughput and durability in data processing workflows. In this session, we will learn how DataXu is using Amazon Kinesis, Amazon S3, and Amazon EMR for its patented approach to programmatic marketing. Every second, the DataXu Marketing Cloud processes over 1 Million ad requests and makes more than 40 billion decisions to select and bid on ad impressions that are most likely to convert. In addition to addressing the scalability and availability of the platform, we will explore Amazon Kinesis producer and consumer applications that support high levels of scalability and durability in mission-critical record processing.
Cigniti joint webinar with Soasta - Agile DevOps: Test-driven IT Environment ...Cigniti Technologies Ltd
This document summarizes a presentation about testing e-commerce websites for Black Friday. It discusses:
- Best practices for retail e-commerce testing including having a testing strategy, understanding user behavior, and testing in production.
- How SOASTA CloudTest can help with testing including global test locations, automated scaling, and a "kill switch" to stop tests without fear.
- A case study of how Cigniti helped a large US retailer improve customer experience by addressing challenges like outdated technology, siloed teams, and a lack of comprehensive testing strategy. Outcomes included improved performance, scalability, and user experience.
This document provides an overview of cyber crime history, laws, and issues in India. It discusses:
- A brief history of cyber crime from the 1820s to modern day, including early computer crimes and the development of hacking.
- An introduction to cyber law in India, including the Information Technology Act of 2000 which is the primary law governing cyber crimes.
- Categories and common types of cyber crimes such as hacking, viruses, phishing, and online fraud.
- The need for strong cyber laws to address issues like privacy, intellectual property, and the growing nature of cyber threats to individuals and organizations.
- Cyber crime statistics that illustrate India's vulnerability, such as being the 3rd
Loggly - Case Study - Stanley Black & Decker Transforms Work with Support fro...SolarWinds Loggly
With Loggly, Stanley Black & Decker:
• Provides team with troubleshooting capabilities for mobile and IoT applications running on traditional and serverless architectures
• Supports performance monitoring, security, and PCI compliance needs
• Enables quick scalability as new innovations are launched
This document is an alphabetized science glossary containing definitions of scientific terms from A to Z. It defines terms such as atmosphere, burrow, climate, data, erosion, fungi, galaxy, hibernate, ion, Jupiter, kinetic energy, life cycles, mantle, nervous system, ozone, periodic table, quartz, rotation, surface water, tectonic plates, universe, volcano, weathering, xenon, year, and zinc. The glossary is intended to teach elementary science vocabulary terms from A to Z.
Big Data Expo 2015 - Hortonworks Common Hadoop Use CasesBigDataExpo
When evaluating Apache Hadoop organizations often identifiy dozens of use cases for Hadoop but wonder where do you start? With hundreds of customer implementations of the platform we have seen that successful organizations start small in scale and small in scope. Join us in this session as we review common deployment patterns and successful implementations that will help guide you on your journey of cost optimization and new analytics with Hadoop.
Presentatie van dhr. prof. dr. Frank Verhulst op het Infantscongres Nijmegen op 28 juni 2016 over de verschillen in ontwikkeling van kinderen, het onderzoek GenerationR.
The document provides an overview of IBM's BigInsights product. It discusses how BigInsights can help businesses gain insights from large, complex datasets through features like built-in text analytics, SQL support, spreadsheet-style analysis, and accelerators for domain-specific analytics like social media. The document also summarizes capabilities of BigInsights like Big SQL, Big Sheets, Big R, and its text analytics engine that allow businesses to explore, analyze, and model large datasets.
EMC Enterprise Hybrid Cloud 2.5.1, Federation SDDC Edition: Foundation Infras...EMC
The document provides a reference architecture for an EMC Enterprise Hybrid Cloud 2.5.1 solution that enables organizations to quickly deploy an on-premises hybrid cloud. The solution features include automation and self-service provisioning, multitenancy and secure separation, workload-optimized storage, monitoring, and modular add-on components like data protection. The key components outlined are VMware vCloud Suite, EMC storage platforms, and integrated EMC and VMware technologies to provide the foundation for enabling infrastructure as a service.
This document discusses how communication service providers can leverage edge cloud computing and virtualized transport (T-NFV) to offer new services and generate additional revenue streams. It notes that many emerging services are moving to or being created in the cloud but require communications connectivity. Edge cloud computing addresses this by situating services closer to end users with lower latency requirements. The document outlines how T-NFV can virtualize transport functions to enable fast, automated delivery of edge cloud services while differentiating the CSP. This virtualized transport is presented as key to enabling edge computing opportunities across sectors like IoT, smart cities, healthcare and more.
Learn how software-driven IP data networking technology enables retail business to capture, leverage, and increase ROI. Wi-Fi network performance for the ever increasing use of mobile devices, balanced with the collection and monetization of data is central to a balanced approach at business growth.
The document discusses challenges related to mobility and BYOD including security, QoS, and Wi-Fi capacity issues. It proposes Aruba's solution of context-aware network services that classify traffic and enforce policies tailored to the user, device, application, and location to optimize performance, integrate wired and wireless networks, and provide visibility and management across the enterprise network.
WebRTC and VoIP share similar characteristics in their architecture and deployment. Both saw progressive introduction where access and transport were established first, followed by switching/signaling and multimedia services. WebRTC offers opportunities for improved customer service through more personalized communication options that are easier to use, such as contact centers, video conferencing, and visual voicemail integrated into web applications. Dialogic provides products that help enable these types of WebRTC-based applications.
WebRTC and VoIP share similar characteristics in their progressive deployment and adoption. Both involve segmented and gradual introduction of technology across areas like client access, transport and signaling, and multimedia services. WebRTC offers opportunities to improve customer service just as VoIP revolutionized integrated communications, moving applications like contact centers to web-based platforms.
WebRTC and VoIP share similar characteristics in their architecture and deployment. Both saw progressive introduction where access and transport were established first, followed by switching/signaling and multimedia services. WebRTC offers opportunities for improved customer service through more personalized communication options that are easier to use, such as contact centers, video conferencing, and visual voicemail integrated into web applications.
The document discusses the challenges and paths forward for virtual customer premises equipment (v-CPE). While network function virtualization (NFV) has benefits, fully implementing v-CPE faces issues related to functional distribution, management complexity, NFV performance and energy usage, and link latency and security. The document proposes steps to better enable v-CPE adoption, such as accelerating NFV, deploying NFV closer to network edges, and using hyper-converged cloud architectures to ease management complexity.
Next Generation of Affordable Connectivity - BristolTodd Kellond
This document outlines an agenda for a presentation on wireless connectivity solutions. The presentation includes sessions on affordable indoor and outdoor WiFi access points, hands-on demonstrations of equipment, and Q&A. It also lists the names and roles of representatives from the hosting and vendor companies who will be present.
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteCohesive Networks
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
About the talk:
Customers don’t care where their cloud networks and infrastructure are, they just want apps to work. This session explains how overlay networks can help to do more networking at the IaaS level and how developers can build on top of overlay networking to extend traditional networks to the cloud.
Via Solutions, Transforming Networks, Unlocking PotentialSmall Cell Forum
The document discusses Viavi Solutions, a company that focuses on providing service providers and enterprises with solutions to transform their networks and unlock potential. Specifically, Viavi provides an end-to-end quality of experience platform to help optimize performance for heterogeneous and dynamic mobile networks through solutions like small cell placement analysis and comprehensive testing and management of RF, RAN, fiber, and cloud components. Viavi also offers real-time data analysis solutions that allow operators to spend more time improving user quality of experience compared to traditional post-processing.
What are customer centric networks
How to assemble them using SDN and NFV
What type of customer centric services you can build with a programmable network
Cisco Meraki is a complete cloud-managed networking solution that provides wireless, switching, security, and mobile device management centrally managed through a web-based dashboard. It was started in 2006 by two MIT students working on a campus network project and has since grown to support tens of thousands of customers across industries with over 100% annual growth. Meraki solutions are recognized for innovation and are trusted by customers worldwide to provide scalable, reliable networking with reduced operational costs.
Colt provides network services to over 25,000 business customers across 3 continents and 28 countries. Their world-class network includes over 187,000 km of fiber and connectivity to over 200 cities. They are investing in software defined networking (SDN) and network functions virtualization (NFV) to transform their network and provide customers with on-demand, cloud-like services. Their Novitas program delivers services like Ethernet on Demand that allow customers to provision bandwidth in real-time through a portal. This provides benefits like faster delivery, elastic bandwidth, and a more flexible network. Colt is also developing SD-WAN services and a distributed NFV platform to further advance their SDN/NFV capabilities.
The document discusses how network function virtualization (NFV) and software-defined networking (SDN) can help telecommunications providers address challenges from over-the-top (OTT) players and enable new services. It presents Metaswitch Networks' software-based virtual network functions that allow elastic scaling and faster innovation. Specific solutions covered include session border controllers (SBCs), residential/business voice services, and deployment on Amazon Web Services for worldwide expansion.
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastrukturyPROIDEA
This document discusses virtualization and optimization of infrastructure using F5 Networks products. It describes how F5 solutions can consolidate infrastructure, optimize application delivery across networks, and provide security, availability and visibility. Examples are given of how F5 virtualizes servers, storage, and data centers to improve performance, flexibility and efficiency.
F5 Infosec Israel 2013 Locking the Door in the CloudsTzoori Tamam
F5 Networks is a leading provider of application delivery and security solutions with over $1.38 billion in revenue in 2012. They have over 3,000 employees globally including 120+ in Israel. Their products provide load balancing, traffic management, and proxy-based security. They can offload SSL processing and provide web application firewall capabilities. F5 also offers solutions for single sign-on and access control through their BIG-IP Access Policy Manager product which supports SAML for federated authentication. BIG-IP APM can consolidate authentication infrastructure and simplify remote access policies for organizations adopting cloud applications.
Making Networks More Agile, Open, and Application Centric - Cisco InsightsCisco Service Provider
Learn how to apply SDN, NFV, and Open APIs to drive positive business outcomes for Service Providers by visiting any of the following pages:
http://www.cisco.com/go/sp
http://www.cisco.com/go/epn
http://www.cisco.com/go/esp
Similar to ECI & Light Reading Webinar: Real Revenues from Virtualized Services - Nov 2015 (20)
5G promises to change the way we live our lives, with unprecedented services and unparalleled user experience. Operators need to build an underlying connectivity infrastructure that is capable of delivering on demands like ultra-low latency and hyper-flexible bandwidth. This webinar will focus on the most critical aspects of the 5G transport network and discuss what is required in terms of slicing, edge computing and the need for openness and interworking. Addressing each of these aspects properly will enable operators to offer state of the art 5G services that will be the foundation of what some people believe will become the 4th industrial revolution.
Topics of discussion:
What factors and demands will influence the infrastructure design?
The impact of 5G on connectivity infrastructure and network requirements
The optional technological solutions and preferred solutions
This document discusses how telecom service providers can adopt cloud native technologies to revolutionize their services. It provides examples of how dynamic VPNs, modernized business services, remote operating rooms, and intelligent edge services could be implemented. While over-the-top players have used cloud native tools successfully, there are gaps for service providers due to their environment integrating connectivity and optimization across domains. The document proposes that service providers can bridge this gap through strong orchestration, inter-provider interfaces, and enhancing platforms to be carrier-grade and distributed to the network edge. Adopting an "augmented cloud native" approach combining these techniques is presented as a recipe to revolutionize telecom services.
This document discusses the need for modernizing critical infrastructure networks to handle increasing traffic demands. It presents MPLS-TP as an approach that can provide the reliability and deterministic performance of legacy infrastructure with the flexibility of IP/MPLS networks. MPLS-TP adds transport features like advanced OAM and protection switching to standard MPLS. The document proposes an "Elastic MPLS" approach using signaling gateways to stitch together IP/MPLS and MPLS-TP domains, allowing different parts of the network to use the most appropriate transport technology while maintaining end-to-end services and management.
This document discusses cybersecurity threats facing critical infrastructure industries. It notes that nearly 70% of critical infrastructure providers have been breached in the past year, with power and utilities being the most targeted. It outlines how the convergence of IT and OT systems, aging infrastructure, distributed systems, and industrial automation modernization are expected to increase cyber threats. The document then describes ECI's LightSECTM cybersecurity solution, which provides encryption, anomaly detection, firewalls, and other security controls across IT and OT networks to secure the connectivity between substations and control centers. It provides an example case study of how LightSECTM was deployed between two transmission companies to secure their SCADA devices and networks.
Multilayer optimization deals with projected traffic demands of each type of service traffic, by constructing and analyzing different combinations for handling traffic across the transport layers to end up with a whole that is much less than the sum of the parts.
Moreover, when combined with centralized SDN control it promises to be a platform for innovative services that generate new revenue streams. While the payoffs are huge, SDN-controlled multilayer-optimized networks are not trivial.
There is a rocket science element to the underlying algorithms, and this increases in complexity when combined with real time control.
The presentation will discuss the motivations, benefits, and approaches, for SDN-controlled, multilayer optimized networks.
This document discusses high speed coherent optical networks and the various technologies and considerations needed for their implementation and management. It makes three key points:
1) High speed coherent networks require a coordinated effort across planning, provisioning, monitoring, and restoration functions to ensure effective performance and low total cost of ownership, just as a marathon runner requires support from various roles.
2) Coherent technology is evolving to support higher speeds and more compact form factors while lowering costs over time. Deployment options include metro, regional, and ultra-long haul networks operating at speeds from 100G to 400G.
3) ECI's Apollo family provides a coherent networking solution that spans access, transport, switching, lifecycle management,
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the “How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Vision” tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his company’s pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
2. ECI Proprietary 2
OTT increasingly
encroaching on
industry revenues
CSP’s still figuring
out how to
monetize network
modernization
WHY ARE WE
HERE?
2ECI Proprietary 2
Email Video
Centralized
Cloud
Computing
Services
Storage
Hosted
Applications
Search
OTT Delivery
3. SO IMAGINE A
DIFFERENT PATH
ECI Proprietary 3
Offering your customers
the ability to use the
network as a dynamic
services platform
Brings value to their
business
Enhance your
revenues
4. ECI Proprietary 4
ENABLING LIMITLESS VERTICAL APPLICATIONS
ECI Telecom Proprietary and Confidential 4ECI Proprietary 4
• Secure record sharing
• Patient wearables monitoring
• Remote operating room
• Ad hoc sessions security
• Continuous data backup
• Network and log analytics
• Resource monitoring & control
• Integrated voice, data, video
• Remote operations
• BW for high volume sales events
• Continuous inventory monitoring
• Secure supplier connections
• Smart City (traffic control)
• Wired city (ubiquitous WIFI)
• Surveillance
• Secure collaboration
• On-demand lecture broadcasting
• Experiment data backup
5. 55ECI Proprietary
EFFECTIVELY BRIDGING THE GAP
Long service
provisioning
cycles
Limited
interoperability/
rigid architecture
Closed
management
system
Traditional working
processes
Shorter
TTM
Greater
operational
efficiencies
Virtualization
New level of
services
NFV
SDN
6. ECI Proprietary 6
NETWORK AS DYNAMIC SERVICES PLATFORM
ECI Telecom Proprietary and Confidential 6ECI Proprietary 6
1.Customer orders
new service
7. ECI Proprietary 7
NETWORK AS DYNAMIC SERVICES PLATFORM
ECI Telecom Proprietary and Confidential 7ECI Proprietary 7
SDN-NFV control
and orchestration
1. Customer orders
new service
2. Network instructed
what is desired
Customer Portal
3. Network configured
as needed
4. Customer starts
using service
Where the
magic occurs
8. CHARACTERISTICS OF
SDN/NFV NETWORKS
Rigidly defined
Phone/template
One at a time
Days to weeks
Contract
None due to OTT
Service nature
Order process
Service mix
Turn up Time
Commitment
Cloud value
Today
9. CHARACTERISTICS OF
SDN/NFV NETWORKS
Dynamic
Custom portal
Mix & match
Minutes
Pay per use
M2M, IOT, etc
Rigidly defined
Phone/template
One at a time
Days to weeks
Contract
None due to OTT
Service nature
Order process
Service mix
Turn up Time
Commitment
Cloud value
Today SDN-NFV Era
11. ECI Proprietary 11
DEFINABLE (VIRTUAL) CPE
ECI Telecom Proprietary and Confidential 11ECI Proprietary 11
SW Configurable
Communications
Platform
Smart Set
Top Box
12. ECI Proprietary 12
MANAGED SECURITY
ECI Telecom Proprietary and Confidential 12ECI Proprietary 12
Monthly
Traffic Audits
Instant
eCommerce
Firewalls
Instant
Applications
as Needed
Parental
Control
13. ECI Proprietary 13
DYNAMIC VPN
ECI Telecom Proprietary and Confidential 13ECI Proprietary 13
Private WIFI
in Public
Domains
Temporary
VPNs
Blue-Ribbon
Gaming
Central
Encrypted
Access for
Remote &
Mobile Users
14. ECI Proprietary 14
DYNAMIC BANDWIDTH
ECI Telecom Proprietary and Confidential 14ECI Proprietary 14
Instant
Feeds to
Broadcast
Business
Continuity
Remote
Operating
Rooms
Increase
Server
Bandwidth
15. REVENUE IMPACT
OF SDN & NFV (1)
ECI Proprietary 15
Fundamentally changes
ability to deliver services
• Customized through
chaining
• Rapid turn up
• Short-lived
Based on “New”
Network Services
Based on
Customization and
Rapid Turn Up of
Network Services
(Service Agility)
Pre SDN-NFV Era SDN-NFV Era
16. Email
Video
Storage
Hosted
Applications
Search
ECI Proprietary 16
CLOUD AND EDGE COMPUTING SERVICES
ECI Telecom Proprietary and Confidential 16ECI Proprietary 16
Latency of Data Transactions
Low sensitivity High Sensitivity
Frequency
of Data
Transactions
Low
High
Centralized Cloud
Computing
Adapted from NTT January 2014
Edge Cloud Computing
Gaming
IoT
Smart City M2M
AR
Health
Care
Enhanced
Mobility
Enterprise
Security
Intelligent
Transportation
17. ECI Proprietary 17
CLOUD VS EDGE COMPUTING NETWORKING
ECI Telecom Proprietary and Confidential 17ECI Proprietary 17
Seattle
New York
Centralized Cloud Computing
• 4000 km, multiple router hops
• Round trip delay ~100ms
• Acceptable for Cloud OTT
• Not acceptable for Edge Computing
Edge Cloud Computing
• 10s of km, 1-2 router hops
• Round trip delay <10ms
• Overkill for Cloud OTT
• Needed for Edge Computing
NYC Traffic
Control System
18. ECI Proprietary 18
TRANSPORT NFV MARRIAGE WITH EDGE COMPUTING
ECI Telecom Proprietary and Confidential 18ECI Proprietary 18
Edge Cloud Computing
Gaming
IoT
Smart City M2M
AR
Health
Care
Enhanced
Mobility
Enterprise
Security
Intelligent
Transportation
Common hyper-converged platform
Enhanced QoE
Policy management
19. REVENUE IMPACT
OF SDN & NFV (2)
ECI Proprietary 19
Biggest upside may be
through synergy with
Edge Computing
services
Based on “marriage”
with Edge Computing
Services
Based on “New”
Network Services
Based on
Customization and
Rapid Turn Up of
Network Services
(Service Agility)
Pre SDN-NFV Era SDN-NFV Era
20. 20
ECI SmartLIGHT™
FRAMEWORK
20ECI Proprietary 20
How are we bringing
the networks of the
future to life….
Neptune
Apollo
LightSOFT
NMS
LightCONTROL
SDN Controller
LightCARE
LightINSIGHT
LightCONNECT
LightTIME
LightACTION
Control TransportAppsSecurity
LightSEC
Mercury
21. ORGANIZATIONS THAT WILL BE ADAPTIVE
ARE THE ONES INVENTING THE FUTURE.
– The Elastic Enterprise
ECI Proprietary 21
There are many stories we tell our customers.
Increasingly we tell them how ECI addresses vertical markets like business services or data centers.
However, there is still a need to talk about products.
So today we tell the Apollo story as it stands in the latter half of 2015.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
In fact bandwidth growth is accelerating, tripling in the next five years.
This is driven by multiple service like over the top video, data center based cloud computing, next generation mobile, and the Internet of Things whereby devices autonomously communicate with each other.
Moreover, an important characteristic of future bandwidth is not just people and device end-users communicating with each other across the network, but great rivers of traffic being created for computing and data distribution wholly within the network itself.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
In fact bandwidth growth is accelerating, tripling in the next five years.
This is driven by multiple service like over the top video, data center based cloud computing, next generation mobile, and the Internet of Things whereby devices autonomously communicate with each other.
Moreover, an important characteristic of future bandwidth is not just people and device end-users communicating with each other across the network, but great rivers of traffic being created for computing and data distribution wholly within the network itself.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
I begin at the end. In case you won’t let me get by my first slide, here is my summary slide at the beginning.
Why should you care about Apollo. Because it is focused on meeting your needs and your bottom line.
Optical networking as we will see is all about lowering the cost per bit, and this is the heart of Apollo with effortlessly scalable all topology networking.
On top of that Apollo integrates packet services, it is ultra-efficient throughout its lifecycle which also lowers the cost per bit, and it is a source of new revenues.
In fact bandwidth growth is accelerating, tripling in the next five years.
This is driven by multiple service like over the top video, data center based cloud computing, next generation mobile, and the Internet of Things whereby devices autonomously communicate with each other.
Moreover, an important characteristic of future bandwidth is not just people and device end-users communicating with each other across the network, but great rivers of traffic being created for computing and data distribution wholly within the network itself.
All about change and adaptivity to change
ECI SmartLIGHT provides Elastic Network Solutions for your customers