This whitepaper dives in Juniper's recent Contrail SDN announcements highlighting key elements of the technology, partnerships and impact as a disruptor in the space.
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson
Software as a service (SaaS) is a promising solution for overcoming the challenges of implementing and managing new network technologies and services like voice over LTE (VoLTE). The SaaS approach can provide substantial savings in terms of cost and lead-time, and create a new source of revenue for service providers.
Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...Mehdi Sif
Dell Technologies / VMwWware Theater Presentation
Creating Agility & Efficiency at Scale
New Economics, Architectures and Advantages in Deploying NFV.
Presenters: Paul Parker-Johnson (ACG Research) , Mehdi Sif (Dell EMC), Chris Wright (Red Hat), and Mallik Tatipamula (F5 Networks) ,Srini Ramasubramanian (Big Switch) Ph.D for a wonderful panel at #MWC17 sharing the details of our recent NFV deployment using Dell EMC, Red Hat, F5 Networks, and Big Switch Networks.
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
Edge Computing is widely recognized as a key technology, supporting innovative services for a wide
ecosystem of companies, ranging from operators, infrastructure owners, technology leaders, application
and content providers, innovators, startups, etc.
The advent of 5G systems has also increased the attention to Edge Computing [1][2], as this technology
supports many of the most challenging 5G use cases, especially those for which high end-to-end (E2E)
performances are required. In fact, due to the presence of processing platforms and application
endpoints in close proximity to end-users, Edge Computing offers a low latency environment and
significant gains in terms of network bandwidth, which are key benefits for the deployment of 5G
networks
Media processing in the cloud- what, where and howEricsson Slides
The evolution to IP technology, VoLTE and new video services will have a profound
impact on the way person-to-person media processing will be performed in the
networks of the future. This evolution raises some questions: what processing will be
needed, where will it take place and how will it be implemented?
Read more from the Ericsson Review here: http://www.ericsson.com/thinkingahead/technology_insights
Ericsson Technology Review: Creating the next-generation edge-cloud ecosystemEricsson
The surge in data volume that will come from the massive number of devices enabled by 5G has made edge computing more important than ever before. Beyond its abilities to reduce network traffic and improve user experience, edge computing will also play a critical role in enabling use cases for ultra-reliable low-latency communication in industrial manufacturing and a variety of other sectors.
This Ericsson Technology Review article explores the topic of how to deliver distributed edge computing solutions that can host different kinds of platforms and applications and provide a high level of flexibility for application developers. Rather than building a new application ecosystem and platform, we strongly recommend reusing industrialized and proven capabilities, utilizing the momentum created with Cloud Native Computing Foundation, and ensuring backward compatibility.
Ericsson Review: Communications as a cloud service: a new take on telecomsEricsson
Software as a service (SaaS) is a promising solution for overcoming the challenges of implementing and managing new network technologies and services like voice over LTE (VoLTE). The SaaS approach can provide substantial savings in terms of cost and lead-time, and create a new source of revenue for service providers.
Mobile World Congress 2017 - Creating Agility & Efficiency at Scale: New Econ...Mehdi Sif
Dell Technologies / VMwWware Theater Presentation
Creating Agility & Efficiency at Scale
New Economics, Architectures and Advantages in Deploying NFV.
Presenters: Paul Parker-Johnson (ACG Research) , Mehdi Sif (Dell EMC), Chris Wright (Red Hat), and Mallik Tatipamula (F5 Networks) ,Srini Ramasubramanian (Big Switch) Ph.D for a wonderful panel at #MWC17 sharing the details of our recent NFV deployment using Dell EMC, Red Hat, F5 Networks, and Big Switch Networks.
Edge computing from standard to actual infrastructure deployment and software...DESMOND YUEN
Edge Computing is widely recognized as a key technology, supporting innovative services for a wide
ecosystem of companies, ranging from operators, infrastructure owners, technology leaders, application
and content providers, innovators, startups, etc.
The advent of 5G systems has also increased the attention to Edge Computing [1][2], as this technology
supports many of the most challenging 5G use cases, especially those for which high end-to-end (E2E)
performances are required. In fact, due to the presence of processing platforms and application
endpoints in close proximity to end-users, Edge Computing offers a low latency environment and
significant gains in terms of network bandwidth, which are key benefits for the deployment of 5G
networks
Media processing in the cloud- what, where and howEricsson Slides
The evolution to IP technology, VoLTE and new video services will have a profound
impact on the way person-to-person media processing will be performed in the
networks of the future. This evolution raises some questions: what processing will be
needed, where will it take place and how will it be implemented?
Read more from the Ericsson Review here: http://www.ericsson.com/thinkingahead/technology_insights
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Every 25 years or so, telecom networks get totally re-designed. The last big re-build came with the internet in the early 1990s. Now “IP networking” technology is giving way to another technology cycle known as “software defined networking”. SDN is a new architecture for telecom networks in which the emphasis shifts from hardware to software. It will be hugely disruptive because it fundamentally changes who controls the telecom network. In the report we predict some of the winners and losers.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
This paper describes a service-oriented architecture for data acquisition and control leveraging some of the latest concepts in software engineering. By addressing the business requirements to support role-based applications
and services, the platform removes the “islands of automation” issue and allows a vertical decomposition of the application stack to lower the barrier to entry for new applications
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
IT Brand Pulse industry brief describing a new approach to configuring virtual networks for virtual machines...layering hypervisor-based virtual networking services on top of hardware based virtual networking services. The result is more efficient management and lower costs.
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
A presentation give at the European H-Cloud Conference to motivate decentralisation as a mean to improve energy efficiency, privacy, and opportunity for monetisation for your digital footprint.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
This paper focuses on a specific real-world use case for SDN - the Software-Defined Data Center. It provides Avaya’s perspective on the characteristics of the Software-Defined Data Center and the value of its Fabric Connect technology as the foundation for this solution. It also talks about how combining Avaya Fabric Connect with open-source cloud orchestration capabilities (that are being defined by OpenStack) can enable a graceful migration to the Software-Defined Data Center.
Juniper Jumpstarts Innovation: Open Sources SDN ControllerJuniper Networks
In this paper industry analyst firm Enterprise Management Associates (EMA) reviews Juniper's OpenContrail announcement. Read on for an overview of Juniper's partnerships and a look at the SDN competitive landscape.
Ericsson Technology Review: Optimizing UICC modules for IoT applicationsEricsson
Commonly referred to as SIM cards, the universal integrated circuit cards (UICCs) used in all cellular devices today are in fact complex and powerful minicomputers capable of much more than most Internet of Things (IoT) applications require. Until a simpler and less costly alternative becomes available, action must be taken to ensure that the relatively high price of UICC modules does not hamper IoT growth.
This Ericsson Technology Review article presents two mid-term approaches. The first is to make use of techniques that reduce the complexity of using UICCs in IoT applications, while the second is to use the UICCs’ excess capacity for additional value generation. Those who wish to exploit the potential of the UICCs to better support IoT applications have the opportunity to use them as cryptographic storage, to run higher-layer protocol stacks and/or as supervisory entities, for example.
Every 25 years or so, telecom networks get totally re-designed. The last big re-build came with the internet in the early 1990s. Now “IP networking” technology is giving way to another technology cycle known as “software defined networking”. SDN is a new architecture for telecom networks in which the emphasis shifts from hardware to software. It will be hugely disruptive because it fundamentally changes who controls the telecom network. In the report we predict some of the winners and losers.
Ericsson Technology Review: The future of cloud computing: Highly distributed...Ericsson
The growing interest in cloud computing scenarios that incorporate both distributed computing capabilities and heterogeneous hardware presents a significant opportunity for network operators. With a vast distributed system (the telco network) already in place, the telecom industry has a significant advantage in the transition toward distributed cloud computing.
This Ericsson Technology Review article explores the future of cloud computing from the perspective of network operators, examining how they can best manage the complexity of future cloud deployments and overcome the technical challenges. Redefining cloud to expose and optimize the use of heterogeneous resources is not straightforward, but we are confident that our use cases and proof points validate our approach and will gain traction both in the telecommunications community and beyond.
This paper describes a service-oriented architecture for data acquisition and control leveraging some of the latest concepts in software engineering. By addressing the business requirements to support role-based applications
and services, the platform removes the “islands of automation” issue and allows a vertical decomposition of the application stack to lower the barrier to entry for new applications
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
IT Brand Pulse industry brief describing a new approach to configuring virtual networks for virtual machines...layering hypervisor-based virtual networking services on top of hardware based virtual networking services. The result is more efficient management and lower costs.
Data Decentralisation: Efficiency, Privacy and Fair MonetisationAngelo Corsaro
A presentation give at the European H-Cloud Conference to motivate decentralisation as a mean to improve energy efficiency, privacy, and opportunity for monetisation for your digital footprint.
Ericsson Technology Review: 5G BSS: Evolving BSS to fit the 5G economyEricsson
The 5G network evolution has opened up an abundance of new business opportunities for communication service providers (CSPs) in verticals such as industrial automation, security, health care and automotive. In order to successfully capitalize on them, CSPs must have business support systems (BSS) that are evolved to manage complex value chains and support new business models. Optimized information models and a high degree of automation are required to handle huge numbers of devices through open interfaces.
This Ericsson Technology Review article explains how 5G-evolved BSS can help CSPs transform themselves from traditional network developers to service enablers for 5G and the Internet of Things, and ultimately to service creators with the ability to collaborate beyond telecoms and establish lucrative digital value systems.
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
While smart factories are becoming widely recognized as a fundamental concept of Industry 4.0, their implementation has posed several challenges insofar that they generate and process vast amounts of security critical and privacy sensitive data, in addition to the fact that they deploy IoT heterogeneous and constrained devices communicating with each other and being accessed ubiquitously through lossy networks. In this scenario, the routing of data is a specific area of concern especially with the inherent constraints and limiting properties of such devices like processing resources, memory capacity and battery life. To suit these constraints and to provide the required connectivity, the IETF has developed several standards, among them the RPL routing protocol for Low powerand Lossy Networks (LLNs). However, and even though RPL provides support for integrity and confidentiality of messages, its security may be compromised by several threats and attacks. We propose in this work TRM-RPL, a Trust based Routing Metric for the RPL protocol in an IIoT based environments. TRM-RPL uses a trust management mechanism to detect malicious behaviors and resist routing attacks while providing QoS guarantees. In addition, our model addresses both node and link trust and follows a multidimensional approach to enable
an accurate trust assessment for IoT entities. TRM-RPL is implemented, successfully tested and compared with the standard RPL protocol where its effectiveniness and resilience to attacks has been proved to be better.
Avaya Fabric Connect: The Right Foundation for the Software-Defined Data CenterAvaya Inc.
This paper focuses on a specific real-world use case for SDN - the Software-Defined Data Center. It provides Avaya’s perspective on the characteristics of the Software-Defined Data Center and the value of its Fabric Connect technology as the foundation for this solution. It also talks about how combining Avaya Fabric Connect with open-source cloud orchestration capabilities (that are being defined by OpenStack) can enable a graceful migration to the Software-Defined Data Center.
Juniper Jumpstarts Innovation: Open Sources SDN ControllerJuniper Networks
In this paper industry analyst firm Enterprise Management Associates (EMA) reviews Juniper's OpenContrail announcement. Read on for an overview of Juniper's partnerships and a look at the SDN competitive landscape.
Innovation and the Rise of the Social ConsumerHorizn Inc.
CMA Digital Day presentation.
Every industry and vertical is going to be rethought in a social way.
The real opportunity is about people redesigning these spaces.
Investors are interested in the background of a country before doing business. Such things that might interest investors are National Income, Political, Financial and Economic Risks and other related variables that can provide information about the economy conditions.
Crony capitalism is a term describing an economy in which success in business depends on close relationships between businesspeople and government officials. It may be exhibited by favouritism in the distribution of legal permits, government grants, special tax breaks or other forms of state interventionism. Crony capitalism is believed to arise when business cronyism and related self-serving behaviour by businesses or businesspeople spills over into politics and government, or when self-serving friendships and family ties between businessmen and the government influence the economy and society to the extent that it corrupts public-serving economic and political ideals.In its worst form, crony capitalism can devolve into simple corruption, where any pretence of a free market is dispensed with. Bribes to government officials and tax evasion are common.Corrupt governments may favour a set of business owners who have close ties to the government over others. This may also be done with racial, religious, or ethnic favouritism.Myanmar needs to plan to restrict the growth of crony capitalism, preventing a minority richer people from limiting the growth of the middle class and keeping the majority of the population in poverty. Crony capitalism in Myanmar makes foreign investments dicey—at least for the West.
White paper from Cohesive Networks - Enterprise Architecture Networking
How cloud service providers can use VNS3 and overlay networks to offer customer-focused security and control.
Bhadale group of companies 5G converged networks services catalogueVijayananda Mohire
This are our 5G offerings in areas of convergence, co-existence and integration of legacy systems, software, hardware and apps with newer 5G functions and architecture
According to a new Gartner report1, “Around 10% of enterprise-generated data is created and processed outside a traditional centralized data center or cloud. By 2022, Gartner predicts this
figure will reach 75%”. In addition to hosting new 5G era services, the other major network operator driver for edge compute and edge clouds is deploying virtualized network infrastructure, replacing many dedicated hardware-based elements with virtual network functions (VNFs) running on general purpose edge compute. Even portions of access networks are being virtualized, and many of these functions need to be deployed close to end users. The combination of these infrastructure and applications drivers is a major reason that so much of 5G era network transformation resolves around edge cloud distribution.
Companies should
strive to incorporate more agility and SOFT in their
processes and IT systems, which will enable them to
respond faster to changes in customer requirements and
market conditions.
Container ecosystem based PaaS solution for Telco Cloud Analysis and ProposalKrishna-Kumar
In our lab setup, we have derived a cluster
container orchestration mechanism to handle the
Telco specific (NFV) capabilities on top of the
traditional containers.
Original document @ http://dl6.globalstf.org/index.php/joc/article/view/1641/1667
Woodside Capital Partners SDN Seminar 6.19.13WoodsideCapital
As networks demand more programmability, flexibility and agility, Software-defined networking is emerging as an important step in transforming data centers and service provider wide area networks. This presentation covers how SDN is emerging as a viable network architecture and includes a market outlook, long-term implications and recent M&A activity in the SDN space.
HARDWARE ARCHITECTURE OF PARALLEL COMPUTING, THE CLOUD COMPUTING REFERENCE MODEL, BUILDING CLOUD COMPUTING ENVIRONMENT, INFRASTRUCTURE AND SYSTEM DEVELOPMENT, HARDWARE ARCHITECTURES FOR PARALLEL PROCESSING APPROACHES TO
PARALLEL PROGRAMMING,
1. Single-Instruction, Single-Data (SISD) Systems
2. Single-Instruction, Multiple-Data (SIMD) Systems
3. Multiple-Instruction, Single-Data (MISD) Systems
4. Multiple-Instruction, Multiple-Data (MIMD) Systems
Similar to Juniper Announces Availability of Its Contrail SDN Solution; Showcases Customers and Ecosystem Partnerships, Most Notably IBM (20)
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Are you able to deliver reliable experiences for connected devicesJuniper Networks
Here are 5 things you can do with Mist Wired Assurance. With Wired Assurance, you can leverage Juniper EX switch telemetry to enable simpler operations, shorter mean time to repair, and better visibility into end-user experiences for your connected devices, including access points, servers, and IoT endpoints.
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
Enterprises are moving from small IoT pilots to large-scale
implementations. What are the biggest security
concerns, and how can you overcome them?
Juniper partnered with the IoT Institute to find out. We surveyed 176 technology decision makers and
influencers who have been personally involved in their IoT security strategy and implementations. Here's what the survey found:
We recently conducted a 16-country survey to gauge the appetite for Digital Cohesion. The results suggest business and consumer users see Digital Cohesion as an inevitable, positive societal development.
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
As competition increases, service providers must be able to respond quickly to competitive pressures and rapidly evolving customer demands. Learn how NFV and SDN allows service providers to embrace a holistic approach to their business transformation and maximize existing capabilities: http://juni.pr/1JQZYOl
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
With mobile subscriptions expected to reach 8.5 billion users by the end of 2016, mobile attack surfaces are growing at an alarming rate. Juniper’s SRX5800 is primed for this increase - with speeds up to 2 Tbps the SRX5800 enables customers to inspect more traffic faster. Mobile has met its match. http://juni.pr/1MKBQDu
High performance data center computing using manageable distributed computingJuniper Networks
Terrapin Trading Show Chicago, Thursday, June 4
Andy Bach, FSI Architect, Juniper Networks
Distributed computing concepts (QFX5100-AA)
Scale and performance enhancements (QFX10000 Series)
Automation capabilities (tie in QFX-PFA)
Larry Van Deusen, Director of the Network Integration Business Unit, Dimension Data
Automation
Value Added Partner Services
What Are Virtual Chassis and Virtual Chassis Fabric?Juniper Networks
This Day One book poster explains the differences between Virtual Chassis and Virtual Chassis Fabric.
For additional technical resources, please visit: www.juniper.net/documentation/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
Juniper Announces Availability of Its Contrail SDN Solution; Showcases Customers and Ecosystem Partnerships, Most Notably IBM
1. Juniper Announces Availability of Its
Contrail SDN Solution; Showcases
Customers and Ecosystem Partnerships,
Most Notably IBM
September 19, 2013 - IDC Link
By: Nav Chander; Brad Casemore; Rohit Mehra; Vernon Turner
On September 16, 2013, Juniper announced the general availability of its Contrail SDN (software-defined
networking) network virtualization solution, including its SDN controller. Juniper also presented a few
significant SDN customer trials with specific use cases while highlighting new partnerships and other
developments around its SDN and software strategy, the hallmark of which is a partnership with IBM
SmartCloud for network orchestration and cloud management.
Contrail is Juniper's network overlay platform for software-defined networking for enterprises, cloud
providers, and communication service providers (CSPs). As a network overlay, Contrail competes directly
with VMware's recently announced NSX and Alcatel-Lucent's Nuage Networks platform, besides a number
of smaller startups.
The Contrail platform includes several components. The first is a software controller that is designed to
run on a virtual machine and can be run in an active/active cluster. The controller exposes a set of RESTful
APIs for northbound interaction with cloud orchestration tools and other applications. According to Juniper,
the orchestrator can be used to request the provisioning of a virtual machine and assign it to a network.
At launch, the Contrail controller works with OpenStack and CloudStack as well as with IBM's SmartCloud
Orchestrator.
The second component is the vRouter, which runs on Xen or KVM hypervisors. (Note that vRouter cannot
run on VMware's ESX.) The controller communicates with vRouters via XMPP and instructs the vRouters
in how to forward packets. The vRouters build tunnels between virtual machines. These tunnels run over
the physical network. Juniper supports multiple tunneling protocols, including VXLAN, MPLS over GRE,
and MPLS over UDP.
With its Contrail launch, Juniper is targeting two segments:
Enterprises and cloud providers that plan to employ virtualized private and hybrid cloud
•
services that seek workload mobility flexibility between private and public cloud services
Communication service providers that are planning to implement NFV-based use cases that
•
utilize service chaining and service orchestration to improve service velocity
The Contrail launch also showcases three key customers that are active in their trials of this SDN
technology, namely SunGard, ISP Prime, and Jaguar Networks. These customers' feedback on their plans
and early developments of implementing network and service virtualization with Juniper's Contrail
indicates that the solution does indeed provide some key benefits in terms of easier provisioning and
improved agility, and the elastic scalability that many IT environments desire. While Juniper has not shared
details of any Tier 1 CSP engagements, IDC believes that AT&T, Orange Business Services, and Telstra,
three long-time Juniper customers, are all believed to be in trials with Juniper for NFV applications.
Juniper also announced OpenContrail, an open source version of the Contrail controller, will be
immediately available as open source software, at opencontrail.org under an Apache 2.0 license. The
company says OpenContrail has everything necessary to create an overlay network. The open source
package includes the controller, vRouter, orchestration APIs, and management console. While
announcing availability of an open source version of Contrail — to draw partners and developers and to
counter competitive options — Juniper does expect most customers to opt for the paid version of Contrail.
- 1-
2. Ecosystem Partnerships
Among the host of SDN technology and cloud orchestration partnerships announced by Juniper, the most
notable is its partnership with IBM SmartCloud for network orchestration and cloud service management.
IBM and Juniper both see the value that Contrail can bring to a cloud provider or enterprise for cloud
orchestration, and Juniper is prepared to aggressively leverage that and position the company as an early
mover in adopting and promoting the market transition toward SDN.
Regarding the IBM relationship, it's important to note that this is with IBM's cloud and software group,
distinct from IBM's Blade and networking group, which has its own software overlay platform, Software
Defined Network for Virtual Environments (SDN VE), based on its DOVE (Distributed Overlay Virtual
Ethernet) architecture. Another aspect of the launch and partnership that does raise some questions is
around the extent of Juniper's involvement with OpenDaylight, especially when IBM is a key promoter of
that alliance and joint development project.
Juniper's SDN Strategy: Will It Be a Disruptor?
Is Juniper's software-centric SDN and network routing platform strategy going to help reposition Juniper
as a leading vendor of choice for both enterprises and CSPs leveraging the open source SDN controller?
Certainly Juniper's pricing for the commercial version of Contrail at $1,700 per socket for a perpetual
license and a one-year subscription (available at $1,000 per socket) follows a conventional software
licensing business approach that is common in the server environment today, which is certainly different
from other networking hardware vendors.
The Contrail SDN architecture, SDN ecosystem, open source strategy, and IBM relationship clearly
demonstrate that Juniper is staking its future on open programmable network architecture. Juniper does
raise the bar on scaling SDN networks and challenges the conventional VLAN scaling and MAC address
issues of other existing networking solutions and emerging SDN solutions. Contrail promises to provide
scale-out capabilities while providing resiliency to the software stack.
Analytics and service chaining are key functional and core capabilities that will round out the value prop
of the Juniper-Contrail solution, also providing interoperability with platforms such as OpenStack,
CloudStack, and SmartCloud for network orchestration. Juniper also completed an analytics engine that
provides a real-time view of what's going on in the network as part of the Contrail SDN controller.
Juniper Networks still faces a number of challenges in the enterprise. It knows that to fully support
application workloads, it must provide products and technologies that not only serve its traditional
constituency of network professionals but also serve other constituencies within the IT department that
want to see faster network provisioning and greater network agility through automation. The question is
not whether Juniper understands customer requirements but whether its approach, which also
encompasses ongoing ASIC development (for programmable network infrastructure) and a network
overlay that emphasizes BGP and XMPP, will resonate as well in the datacenter and in the enterprise as
it might among service providers.
Contrail's general availability enables CSPs to plan and deploy NFV-based use cases with a technology
solution that is based on MPLS layer 3. Most CSPs are more likely to embrace a migration of their MPLS
network infrastructure and architecture. CSPs are more comfortable with IP/MPLS layer 3 networking
solutions and have the technical expertise within their organizations. CSPs, however, also desire the open
programmable network routing functionality that can help them achieve service velocity that can compete
with AWS, Google, Rackspace, and Microsoft for cloud services. Juniper, however, still is likely to face off
against ALU/Nuage Networks for much of this migration since both companies have a similar technology
and SDN solution strategy based on layer 3 overlays and that will be open, programmable, and
multivendor.
- 2-
3. Juniper claims that it has more than 40 active customer Contrail trials; however, some of those include
other vendors (such as IBM and Red Hat). Several leading NFV application use cases utilizing the Contrail
SDN controller include a virtual CPE service strategy, new virtualized services such as a virtual firewall,
and compute as a service, which Colt, AT&T, OBS, and others are interested in. One notable recent
change in Juniper's SDN overall strategy is to no longer compete in virtualization of the Evolved Packet
Core (EPC) market segment and instead focus on core CSP enterprise, broadband, and cloud service
network opportunities.
Juniper still needs to deepen its relationships with service providers through professional services–
oriented early adopter programs for SDN, in addition to the existing frameworks for OSS/BSS integration.
Supporting NFV trials will require some additional resources and will also create opportunities for Juniper
to help CSPs integrate other networking hardware and software, if done right. Given that Juniper lacks
the portfolio breadth of competitors such as Cisco (particularly on the cloud applications front), expansion
of joint development arrangements with service providers such as Colt, AT&T, and joint go-to-market
partnerships with technology-agnostic systems integrators such as IBM and Tech Mahindra will be critical
to forging more strategic solution creation relationships with service providers.
Future Outlook
Juniper has clearly articulated a broad company strategy where it is moving from a hardware engineering
focus to a balance of hardware and software architectures, a proof point of which is how it has taken the
lead with packaging, pricing, and licensing its software controller offering. In addition, the open source
direction not only is for the Contrail SDN controller but is a strategic direction for Juniper. Juniper does
need to work more closely with Open Stack and CloudStack and leverage its orchestration relationship
with IBM (and others) to develop a stronger integrated strategic network virtualization solution portfolio
that appeals to more than CSPs. It is certainly crucial for Juniper to retain and grow market share in the
CSP segment, and Juniper will have to continue to be aggressive in deploying service trials by articulating
specific benefits of NFV and SDN use cases with real proof points.
For some traditional IT vendors, this is both a challenge and a necessity if the vendor is to make the shift
to the next-generation business models where "services" are a key differentiator. To be able to do that,
the infrastructure elements (network, storage, and servers) have to be delivered as services and therefore
advances in broad virtualization capabilities will become a table stake. Juniper, through its software
strategy, appears to be one of the leaders in the network industry to make this transition.
Subscriptions Covered:
Enterprise Communications Infrastructure, Wireline Network Infrastructure, Datacenter Networks
Please contact the IDC Hotline at 800.343.4952, ext.7988 (or +1.508.988.7988) or sales@idc.com for information on applying the price
of this document toward the purchase of an IDC or Industry Insights service or for information on additional copies or Web rights. Visit
us on the Web at www.idc.com. To view a list of IDC offices worldwide, visit www.idc.com/offices. Copyright 2013 IDC. Reproduction is
forbidden unless authorized. All rights reserved.
- 3-