Uwe Richter, Juniper Networks
Juniper Day, Praha, 13.5.2015
Jestliže SlideShare nezobrazí prezentaci korektně, můžete si ji stáhnout ve formátu .ppsx nebo .pdf (kliknutím na tlačitko v dolní liště snímků).
This presentation discusses 5G for Connected and Automated Driving and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
Introduction to Rakuten Mobile Virtual Network OperatorKAILASH CHAUHAN
Introduction to Rakuten MVNO (Mobile Virtual Network Operator), designed to leverage Network /Cloud and OTT to become leader in next generation innovation in telecommunications networks ( ORAN/VRAN)
With the Ericsson 5G Core System we have built an architecture that is highly flexible, modular, and scalable. It supports a much higher degree of programmability and is ready to exist in a cloud-based environment. We help you to quickly react to new challenges and capture any business opportunity that arise.
This presentation discusses 5G for Connected and Automated Driving and was given at a Symposium on the Future Networked Car 2018 (FNC-2018) in Geneva, Switzerland on 8 March 2018. Find more information on this symposium here: https://www.itu.int/en/fnc/2018/Pages/programme.aspx
With 5G use cases placing more demanding requirements on the networks, Ericsson is strengthening its end-to-end mobile transport solutions by building on its radio expertise and adding best-in-class transport technologies from Juniper Networks and ECI Telecom.
Introduction to Rakuten Mobile Virtual Network OperatorKAILASH CHAUHAN
Introduction to Rakuten MVNO (Mobile Virtual Network Operator), designed to leverage Network /Cloud and OTT to become leader in next generation innovation in telecommunications networks ( ORAN/VRAN)
With the Ericsson 5G Core System we have built an architecture that is highly flexible, modular, and scalable. It supports a much higher degree of programmability and is ready to exist in a cloud-based environment. We help you to quickly react to new challenges and capture any business opportunity that arise.
Imagine if we want to alert or notify someone in by ringing bell remotely through your smartphone. This project was taken consideration for such cause.
Upgrade our custom automated School Bell with emerging concept of IOT (Internet of thing) where the entire process of ringing bell is automated and integrated with internet and can set alarm or ring alarm in case of emergency remotely through a smartphone. Highly encrypted with support of Firebase server.
Serve the next wave is an Ericsson solution which supports operators to build cost efficient networks to the 50 % of the world’s population who still lack internet connection.
Ericsson Distributed Cloud goes beyond NFV and Edge Computing. It brings to operators the best of telecom and cloud capabilities, placing the application where it’s needed the most (centrally, distributed or at the edge). It’s an open platform, with end-to-end orchestration, that allows operators to prepare their infrastructure to unlock at least 25% of the business potential of 5G use cases. Visit our page: www.ericsson.com/distributed-cloud
http://www.ericsson.com/ourportfolio/telecom-operators/networks-software-15b
Ericsson Networks Software 15B (release B, 2015) is leading the way the ICT industry is transforming itself, offering increased performance and commercial simplicity for software delivery. Networks Software 15B delivers many new capabilities in the areas of radio access, cloud & virtualization, as well as in the network management & control domain, promising to boost networks for maximum performance.
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Red Hat Summit 2017 – Telco Cloud TransformationEricsson
5G and IoT has opened up opportunities, but also put requirements on the network infrastructure to support key use cases, based on network slicing. It’s important to leverage on the telco cloud strategy to create value and make your network more agile and your operations more efficient, focusing on automation. Ericsson can help you define a telco cloud strategy based on your strategic objectives – and then plan, build and deploy the capabilities you need to compete in the digitalized marketplace.
Artificial intelligence in IoT-to-core network operations and managementADVA
Danish Rafique’s OFC 2019 presentation explores the AI application space and its architectural integration into today’s end-to-end network management stack.
Reliable Onboard Media Services for the Latest Heavy-Load Cargo Rebuild - Cas...ST Engineering iDirect
Globecomm VSAT is a state-of-the-art global network based
on the ST Engineering iDirect IP-based platform that offers
access to new High Throughput Satellite (HTS) Ku-, Ka- and
C-Band services on a single platform, providing a broad range
of narrowband and high-throughput applications over a
robust and scalable network for maritime, government and
energy markets.
Mobile Trends And Transformation - Arun BansalEricsson
Mobile Trends And Transformation presentation from MWC 2015 media group briefing
Arun Bansal SVP and Head of Business Unit Radio, Ericsson
Mobile World Congress in Barcelona 2015
Imagine if we want to alert or notify someone in by ringing bell remotely through your smartphone. This project was taken consideration for such cause.
Upgrade our custom automated School Bell with emerging concept of IOT (Internet of thing) where the entire process of ringing bell is automated and integrated with internet and can set alarm or ring alarm in case of emergency remotely through a smartphone. Highly encrypted with support of Firebase server.
Serve the next wave is an Ericsson solution which supports operators to build cost efficient networks to the 50 % of the world’s population who still lack internet connection.
Ericsson Distributed Cloud goes beyond NFV and Edge Computing. It brings to operators the best of telecom and cloud capabilities, placing the application where it’s needed the most (centrally, distributed or at the edge). It’s an open platform, with end-to-end orchestration, that allows operators to prepare their infrastructure to unlock at least 25% of the business potential of 5G use cases. Visit our page: www.ericsson.com/distributed-cloud
http://www.ericsson.com/ourportfolio/telecom-operators/networks-software-15b
Ericsson Networks Software 15B (release B, 2015) is leading the way the ICT industry is transforming itself, offering increased performance and commercial simplicity for software delivery. Networks Software 15B delivers many new capabilities in the areas of radio access, cloud & virtualization, as well as in the network management & control domain, promising to boost networks for maximum performance.
This presentation takes you through an automation Journey from self-healing to #Network #Slicing. It describes the need for orchestration and the service providers’ steps towards automation. It presents Verizon’s customer case of service life-cycle automation, including VNF on-boarding, service design, provisioning and closed loop assurance. Then it explores network slicing including the definition of blueprints and network slice life-cycle management. More information on Ericsson Dynamic orchestration - http;//www.ericsson.com/dynamic-orchestration
Red Hat Summit 2017 – Telco Cloud TransformationEricsson
5G and IoT has opened up opportunities, but also put requirements on the network infrastructure to support key use cases, based on network slicing. It’s important to leverage on the telco cloud strategy to create value and make your network more agile and your operations more efficient, focusing on automation. Ericsson can help you define a telco cloud strategy based on your strategic objectives – and then plan, build and deploy the capabilities you need to compete in the digitalized marketplace.
Artificial intelligence in IoT-to-core network operations and managementADVA
Danish Rafique’s OFC 2019 presentation explores the AI application space and its architectural integration into today’s end-to-end network management stack.
Reliable Onboard Media Services for the Latest Heavy-Load Cargo Rebuild - Cas...ST Engineering iDirect
Globecomm VSAT is a state-of-the-art global network based
on the ST Engineering iDirect IP-based platform that offers
access to new High Throughput Satellite (HTS) Ku-, Ka- and
C-Band services on a single platform, providing a broad range
of narrowband and high-throughput applications over a
robust and scalable network for maritime, government and
energy markets.
Mobile Trends And Transformation - Arun BansalEricsson
Mobile Trends And Transformation presentation from MWC 2015 media group briefing
Arun Bansal SVP and Head of Business Unit Radio, Ericsson
Mobile World Congress in Barcelona 2015
This presentation is based on Evolution of Passive Optical Network. We study strategies for increasing the PON’s capacity regardless of its technology: EPON (Ethernet-based PON) or GPON (Gigabit capable PON). It can also introduce other future Technologies like SCM Hybrids and Coherent PONs.
Basics of Optical Network Architecture, PON & GPONSyed Shujat Ali
Our Team's University Project | A short presentation based project regarding optical fiber communication in which basics of Optical Network Architecture, PON & GPON were discussed.
A complete power point presentation to know how Public Switching Telephone Network works. Useful for those in the working field or for the ones who want to know more or submitting any project report..
Charla preparada para la cátedra de "Nuevas Tecnologías WAN" v1.2 - Expuesta el 30/08/2010 en la Universidad Tecnológica Nacional - Facultad Regional Santa Fe (Santa Fe - Argentina).
Abordamos la tecnología DSL, sus componentes, codificaciones, problemas y variantes. Y profundizamos mas especificamente en la tecnología ADSL (Asymmetric Digital Subscriber Line).
Fibre optic FTTH FTTX network design, engineering and planning solutions,van den Dool Dick
Fibre optic FTTH FTTX network software solutions to design, engineer & plan FTTH / FTTX networks cost optimized automatically. Shows the required input, design phase and output to Autocad etc.
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
VMworld 2013
Alka Gupta, VMware
Sanjay Aiyagari, VMware
Allon Dafner, Amdocs
Iain Woolf, Alcatel-Lucent
Artur Tyloch, Nokia Solutions and Networks
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Chair: Ewan Quibell, management systems and service leader, Jisc.
16:15-16:55 - The autonomous network
Speaker: Simon Parry, CTO UK public sector, Ciena.
You’ve virtualised your servers, virtualised your storage, maybe even virtualised an application, but what about the network that joins it all together? How do you build an agile, open network that responds to the new world of on-demand services, without impacting current performance and while delivering greater efficiencies?
Find out how a network operator can save money and deliver a more responsive experience and outcome for your users.
5 Steps to a Secure Hybrid Architecture - Session Sponsored by Palo Alto Netw...Amazon Web Services
A hybrid Architecture is one of the easiest ways to securely address new application requirements and cloud-first development initiatives. This approach allows you to start small and expand as your requirements change while maintaining a strong security posture. In this session, you will learn the 5 key steps to building a hybrid architecture using the VM-Series next-generation firewall.
Speaker: Bisham Kishnani, Consulting Engineer (APJC) – DataCenter & Virtualization, Palo Alto Networks
Karsten Geise's presentation for Internet Security Days 2016 showed how governments and businesses can protect critical infrastructure against backdoor cyber attacks.
The value proposition of enabling IP data networks with intelligent unified solutions. ICC Networking as the best software-driven solution to drive down the cost of connectivity while increasing network elasticity and performance.
Polymorphic Attacks on Data-in-Motion Require a New Security Approach From Bo...ADVA
In his presentation at Merit Member Conference 2016, Bill Balmer demonstrated that a layered encryption strategy is the ultimate way to combat the latest cyberthreat: polymorphous attacks.
Operating costs decrease and agility increases, allowing you to react quickly to new market opportunities.
http://www.cisco.com/web/offers/sp04/simplifying-operations/index.html?KeyCode=000947566
Prezentace z webináře dne 10.3.2022
Prezentovali:
Jaroslav Malina - Senior Channel Sales Manager, Oracle
Josef Krejčí - Technology Sales Consultant, Oracle
Josef Šlahůnek - Cloud Systems sales Consultant, Oracle
Prezentace z webináře ze dne 9.2.2022
Prezentovali:
Jaroslav Malina - Senior Channel Sales Manager, Oracle
Josef Krejčí - Technology Sales Consultant, Oracle
Josef Šlahůnek - Cloud Systems Sales Consultant, Oracle
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
4. SILICON VALLEY TRENDS – VIDEO AND MEDIA
Streaming:
7.8 Billion hours TV on Netflix in Q4 2014 alone
Content is king
– own series (Netflix, Amazon, HBO ..
– own networks (Apple, Google, Facebook .. )
5. SILICON VALLEY TRENDS – CONTINUED
Augmented Reality
Virtual Reality
Big Data and Machine Learning
6. INFLECTION POINT: GLOBALLY CONNECTED
PEOPLE DEMAND CONSTANT INNOVATION
~50% of large enterprises will have hybrid
cloud deployments by the end of 2017CLOUD
1.28B smartphones shipped in 2014MOBILITY
Average total cost of a data breach jumped
15% in 2014 to ~$3.5M
SECURITY
Mobile video will account for more than
half of all mobile data traffic by 2018
VIDEO
BIG DATA
Through 2017, 25% of big data implementations
will fail due to inadequate network infrastructure
7. TRENDS DRIVE INTENSE DEMAND FOR NETWORK…
& CONTINIOUS NEED FOR INNOVATION
"Massive in the core, intelligent in the edge".
“pervasive in the access and simple to operate.
80% of new Enterprise Apps are deployed in the Cloud.
Consumerization of IT, ENT SMAC, TV4K, IoT…
CLOUD &
VIRTUALIZATION
G.Fast, vectoring for existing copper, 10GPON (G987),
DOCSIS 1.3, Wifi 802.11ac/ad, LTE-A, 5G, TV4K, IoT…
ENABLING
TECHNOLOGIES
Pluggable 100G coherent, coherent 100G transponder, soon 400G
and 1T optical interfaces
CORE
& OPTICAL
Edge services evolving from L2-3 to Virtual L4-7, scaling out,
automation…EDGE & NFV
From static CLI, to “click to cash”, SON… analytics,
simplification,
SOFTWARE &
AUTOMATION
9. MASSIVE SCALE
PHYSICAL & VIRTUAL SECURITY
FIVE 9s AVAILABILITY
AUTOMATION
MULTI-TENANCY
AGILE SERVICE DELIVERY
Accelerating growth
in data traffic
2009 2013
100
petabytes
2,000 petabytes
EVERYTHING AS A SERVICE
• Global Delivery Engine Attributes
10. SIMPLIFIED ARCHITECTURES
DYNAMIC OPTIMIZATION
RICH ANALYTICS
CENTRALIZED & DISTRIBUTED
INTELLIGENCE AND CONTEXT
SECURITY CORRELATION
& ACTIVE DEFENSE
THE NETWORK THAT KNOWS
• High-Performance Networks Attributes
Connections are open standard interfaces
Security
Core
Routing
Switching
Edge
Routing
Network
Intelligence
and Control
15. ROUTING PRODUCT PORTFOLIO
Massive in the core
- Lean Core with LSR
- Packet Optical Transport
- Full IP Core, QoS & Services
- Lead with Northstar: Optimized
and automated with multi-layers
traffic engineering.
Universal In the Edge
- Continuous leadership: new
HW, SW, User experience
- Advance services (SCG) and
pathway to NFV
- Virtualization: vRR, vMX…
- Continuous new use cases
Ubiquitous in the Access
- Mature SW for access: L2,
OAM …
- SCBH: ACX500
- Wireline & Converged: ACX5K
- MBH: ACX1,2 & 4K
- NMS: SAD2.0
PTX MX ACX
16. MX Advanced Router and Cloud Services
Application
and Subscriber
Aware software
App
Awareness
Sub.
Awareness
Inline
JFlow
Visibility
software
Security
software
Flow
Monitoring
Deep
Inspection
IPS IPSec
Stateful
Firewall
Network
Addressing
software
CGNAT
Junos
Web
Aware
MX 3D Universal Edge
Routers
17. LESS
LOW
HIGH
FLEXIBILITY
MORE
Multiservice Edge
Consumer Edge
MPLS Core
Data Center Switching
IP Core
Campus Switching
Secured Routers
Security
Appliance
Mobile Edge
Vanilla Switching
Low
Bandwidth
Access
Merchant
Silicon
BANDWIDTH
OTN Services
Trio
Express
Stateful
Processors
Silicon Architectural Coverage
22. Effects:
Car manufacturing time reduced by 90%
Introduced interchangeable/standardized parts (always available).
Able to lower car cost by 50%
Car demand increased exponentially
Increased employee wages by 150%
Result:
Higher profitability
Lower cost of operations thru increased automation & efficiency
ASSEMBLY LINE AS A DISRUPTIVE AUTOMATION
FRAMEWORK
23. SDN is/could be the
“ASSEMBLY LINE”
for the
Service Provider!
24. is a Service Provider services framework,
leveraging on SDN and virtualization capabilities,
to provide network functions and software,
to enterprise customers and consumers,
in a cost-effective, timely and efficient manner,
to create new revenue opportunities.
vCPE
By taking advantage of the scripting capabilities built into the Junos operating system, you can reduce network downtime, reduce configuration complexity, automate common tasks, and decrease the time to problem resolution.
Cloud
Nearly half of large enterprises will have hybrid cloud deployments by the end of 2017 (Gartner, Inc., “Private Cloud Matures, Hybrid Cloud Is Next,” October 2013 http://www.gartner.com/newsroom/id/2599315)
89% of enterprises will use, pilot or plan private cloud services in 2014 (Gartner, Inc., “Private Cloud Matures, Hybrid Cloud Is Next” September 2013 http://www.gartner.com/document/2585915?ref=TypeAheadSearch)
Mobility
1.2 B smartphones projected to ship in 2014 (IDC, “Quarterly Mobile Phone Tracker,” May 2014 http://www.idc.com/getdoc.jsp?containerId=prUS24857114)
Security
The average total cost of a data breach has jumped 15% in 2014, to about $3.5 million (Ponemon Insitute, “Cost of Data Breach Study: Global Analysis”, May 2014 http://www.ponemon.org/blog/ponemon-institute-releases-2014-cost-of-data-breach-global-analysis )
Video
Mobile video will account for over half of all mobile data traffic by 2018 (iGR, “Global Mobile Video Traffic Forecast, 2013 – 2018”, May 2014 http://www.marketwired.com/press-release/new-igr-study-forecasts-global-mobile-video-traffic-will-account-more-than-half-all-1914451.htm )
Big Data
The average amount of data enterprises manage today will increase 76% to 289 terabytes by mid-2015. (IDG “2014 Big Data Study,” February 2014 http://www.networkworld.com/news/2014/020514-big-data-278471.html)
Through 2017, 25% of big data implementations will fail to deliver business value resulting from performance problems due to inadequate network infrastructure. (Gartner, Inc. “Is Your Network Ready for Big Data?”, October 2013 http://www.gartner.com/document/2616317?ref=QuickSearch&sthkw=andrew%20lerner&refval=138503063 )
This morning, we will share with you the innovation available today to enable you to solve your customers problems and grow your business in 2015. We will also share where we plan to invest with a focus by networking domain including Campus and Branch, and Data Center for both Enterprise and SP customers.”
The “Everything as a Service” Cloud Market Favors Juniper
Juniper’s opportunity - Help customers build their clouds, where “everything will be a service” model.
64% of IT orgs will increase spending on cloud services through 2017
Our strategy is to continue to be deeply embedded in customers who are first movers in the cloud:
Telco, Cable
Cloud providers- Top 5 cloud providers expected to grow 13% p.a. 2013-17 vs 1% carrier capex
Financial services
National governments- spend on public cloud services growing 18% p.a. 2013-17 vs. 3% total IT spend
Traffic keeps growing… upgrades correlated with “Netflix entry”
Video is king… networks need to be designed with that pivot (from voice and messaging)
Not only volume growth… non-linear sophistication of flows in light of massive payloads driven by 5B people
Growth in data traffic is accelerating at an unprecedented rate!
Everything will be as a service
Attributes are in our wheelhouse (review list)
BIG DATA in cloud needs to be extracted= innovation, knowledge and creativity
High-Performance Network Market Favors Juniper
In 2012 the HPC ecosystem was $21.9B
By 2017, HOC will grow to record $30.2B
Product Portfolio
Silicon as foundation
Core and Edge routing
Switching
Security
Open standard interfaces connecting each element
All controlled through network intelligence
Key attributes are in Juniper’s wheelhouse:
Simplified architectures
Dynamic optimization
Rich analytics
Centralized & distributed intelligence and context
Security correlation and active defense
These attributes play into Juniper’s DNA as a leading provider in the networking industry
Combination of Cloud Building + High-Performance Networking = unlimited creativity capacity for innovation
Before clicking:
“Quality” is a matter of perception. Vendors can explain why their products and services are high quality, but each Customer’s unique perception determines that Customer’s view of the quality.
There are four related dimensions, or factors, that impact a Customer’s perception of quality (especially a high tech product):
The “Absolute Number of Defects” in the product – and since we never really know the exact number of defects, the “Defect Discovery Rate”. The more quickly and frequently the Customer runs into a problem, the lower the perceived quality. Not just of the product – the Customer also assesses the vendor’s Engineering and Quality Assurance teams.
The “Impact of a Defect”. A single failure that severely impacts the Customer’s business or brand can result in the Customer having a lower quality perception, as compared with many small defects. Highly impactful defects get visibility at higher levels of management within the Customer and potentially expose the Customer to bad press – which will often be deflected back to the original vendor. Such impactful defects also result in the Customer questioning the quality of the Design and Architecture of the products, the Engineering and Quality Assurance teams, etc.
Time to Deliver a Resolution. Not just true for severe probllems – even if minor, annoying issues take a long time to resolve, the Customer’s perception of the quality goes down. The Customer questions the quality of the Support teams, the Engineering teams, the processes and tools, etc.
Customer Pain to Adopt the Resolution – The Customer has already lived through the pain of the defect. If the pain, cost, etfort, time, etc. necessary to implement (test, deploy, etc.) the resolution are high, then the Customer questions the quality of the product’s Total Cost of Ownership strategy – and the quality of the architecture.
As each and all of the above measures go “up”, quality is perceived as lower. All of the above are important and are continually being addressed within Juniper.
Click…
But everything in this presentation is specifically associated only with reducing the “Time to Deliver a Resolution”. It is here that High IQ Support plays a fundamental and compelling role.
It is not just about identifying attacks and attackers, you have to stop them. In fact, you need to be able to stop them in an automated fashion. Today I will be sharing details with you on how we not only stop more threats, but how we can enable you to help your customers stop them faster.
It’s not only about performance, but price and performance. I will be sharing with you how we continue to exceed in every dimension of performance and in many cases, set the bar for price/performance leadership across routing, switching, and security
Automation is the future of everything. Were you aware that per the Boston Consulting Group, spending on robotics for automation is projected to reach 26.9B in 2015 and $66B in 2025? That is the automation of our physical world, but in the world of connectivity we are in the midst of a change that is as significant as the transformation that hit the car industry in the early 1980’s. 1000’s of network engineers will need to re-task and re-learn software development to automate repetitive tasks. This will create a huge opportunity for those of you who are able to help your customers through this transition.
Analytics – Analytics in networking is about making better decisions about investments, enabling better operations, reducing the time to troubleshoot problems – we have made tremendous strides in analytics in 2014 and I will be sharing our opportunity in 2015
MetaFabric is our network architecture for routing, switching, security and SDN in the Data Center. It encompasses our partnerships for storage, compute and virtualization.
We have delivered two design guides in 2014 showcasing how to put together an end to end data center
MetaFabric is all about the pillars of simple, open, and smart
I will be sharing with you how we are solving fundamental problems with our Cloud Analytics Engine, discussing how security in the data center is transforming, and how we are leading the way in performance and scale – both in security as well as in the SPINE.
The future of the Data Center is about micro-perimeterization. The perimeter is not going away, it is multiplying exponentially. This is about enabling the transformation from securing segments to applications. This means there will be a growth from tens to hundreds of firewalls from physical to virtual. This means you don’t have ten thousand lines of firewall rules in a given firewall. Your firewall rules are smaller because they are only protecting one application. If there is a failure or breach, it is limited to that specific application or application instance.
Migrating to a micro-perimeterized data center means you must automate and orchestrate. Attempting to move from dozens to hundreds or thousands of smaller firewalls is impossible without automation and orchestration. Our vSRX portfolio growth gives you the performance you need for this use case as well as the API’s to integrate into vmware and other leading hypervisors. It will also evolve to enable you to run on the most popular IaaS players.
Now, this transition will not happen overnight, so performance in the physical firewall is still critical. Today, I would like to announce several major enhancements to our SRX 5000 series that showcase our performance advantage.
The MX 3D Proven Monetizable Router, plus Value Added Services.
Our service approach is flexible to use traditional service models where you can deploy services using inline services on MPCs or dedicated services on service cards like MS-MPC/MIC or services in the cloud on tethered or appliance or in the cloud in x86 based appliances
We build our applications on a single common OS—Junos--as opposed to different and dissimilar OS/code per appliance or service cards with features that only use a specific OS release.
Juniper offers one single, efficient network element—Router + Application—vs traditional router plus many appliances (see next slide) service approaches.