Search Results for: network

MEC Edge Computing Platforms Facilitate 5G NR Transport Network Transformation
Telecommunications operators worldwide are accelerating 5G deployment to deliver on their promises to significantly reduce latency, increase connection speed, enhance network security, and improve quality of service for end users. Evolving from 4G/LTE to 5G New Radio (NR) transport architecture facilitates Radio Access Network (RAN) virtualization by splitting the original Baseband Unit (BBU) into Central Unit (CU) and Distributed Unit (DU). Coupled with Multi-access Edge Computing (MEC), the architecture transition provides operators with a solid foundation to build an optimized network by effectively implementing network slicing and spectrum sharing, and therefore helps them open up enormous new application and service opportunities based on varying customer needs and requirements. Join us in this webinar to learn more about the advantages and benefits from the transformation to 5G NR architecture, the technical requirements of MEC edge computing platforms, and the business opportunities for platform suppliers like ADLINK that provide white-box solutions with standardized interfaces for the industry.

TOPICS:

What’s Next? Navigating the Future of 5G and Zero Trust in Enterprise Networking
Clearly enterprise networking is evolving, but how — and, how fast? Some of the biggest and most rapid changes are in the realms of network connectivity and security. Join Cradlepoint for this webinar as we explore the latest networking trends and forecast transformative shifts in the landscape. Topics will include: *The “Business Anywhere” Paradigm: Given the advanced capabilities of 5G for business, how many of an enterprise’s connectivity needs can be met by cellular? *Hybrid Workforce Challenges: In the era of hybrid work, which technologies and solutions are best suited to help IT teams address security risk among widespread employees? *Zero Trust and 5G SASE: How can organizations adopt zero trust principles and evolve to a genuine 5G Secure Access Service Edge (SASE) network for robust, agile security and performance optimisation? Join Cradlepoint’s Donna Johnson, CMO, and Paul McHugh, area director for United Kingdom and Ireland, as they discuss the future of secure 5G connectivity. Book this live chat into your diary and gain valuable insights about the future of connectivity!

TOPICS:

3rd Gen Intel® Xeon® Scalable Processors for Networking Usages - Part 2
* Click on the video to see attachments pertaining to this webinar | Intel® Xeon® Scalable Processors bring to market multiple technologies that improve security, packet processing and AI capabilities. This talk will address the key technologies and how they can be used to build efficient NFV solutions. Presenters: - Bryan Butters, Network Platforms Product Manager, Intel - Praveen Mosur, Sr. Principal Engineer, Network Platforms, Intel

TOPICS:

ONUG FALL '21 Broadcom Redefines Network Observability w/ Embedded Log Analytics
PROOF OF CONCEPT: IT operations teams often struggle to assemble an effective network performance management (NPM) toolkit because the landscape is becoming increasingly complex each day. The Operations, Administration and Management (OAM) based low fidelity data collection methods e.g. SNMP, ping had been historically targeted towards human operators to monitor and diagnose the Traditional data center networks. With Modern high-definition Network telemetry data from SDN, SD-WAN, Hybrid cloud(s), real time observability becomes a challenge, resulting in blind spots, Higher MTTR. The sheer Volume, Velocity and Veracity of network monitoring data stream isn’t actionable by human operators efficiently anymore; it’s only suitable to be consumed by machines. As the Industry leading NPMD solution provider, DX NetOps from Broadcom is positioned at the forefront of this revolution. We are transparently pairing the Fault, performance, Flow & Log data with appropriate downstream ML algorithms, for gaining contextual analytics by the operators within a single-pane of glass monitoring console. Join us in this session, as we showcase the journey towards modern network observability; combining the power of embedded Log Analytics within the network realm. In this session, learn how our solution is redefining the smart NetOps operator workflows of the future, harnessing advanced insights from our AI engine (available as a SaaS &/or on-premises). Broadcom is collecting your personal data when you submit such information as part of the BrightTALK registration process. Your personal data is processed according to Broadcom's Privacy Policy: https://www.broadcom.com/company/legal/privacy/policy When you interact with Broadcom, this serves as your authorization to BrightTALK to provide your contact information to Broadcom in order for Broadcom to follow up on your interaction.

TOPICS:

ZSM PoC#2 showcase: Automated network slice scaling in multi-site environments
ETSI ZSM ISG PoC#2 aims to demonstrate the capability to automatically scale out a network slice instance deployed across multiple administrative domains. This is achieved using the 5G assets of 5G-VINNI. 5G-VINNI is a large-scale, end-to-end 5G facility composed of several interworking sites, each corresponding to a different EU node and defining a single administrative domain. The management and orchestration capabilities of individual 5G-VINNI facility sites, and the enablers allowing for the interworking across them, are aligned with ZSM architectural design principles. This webinar showcases the ZSM PoC#2, with a demo applied over a network slice deployed across two 5G-VINNI facility sites: Madrid (Spain) and Patras (Greece). This PoC demo will show how OSM and Openslice stacks collaboratively work to provide automation means for a zero-touch scaling operation over this network slice.

TOPICS:

Cyber Risk Roundtable Ep. 4: Protecting OT Networks with Zero Trust Architecture
Zero Trust Architecture (ZTA) is a cybersecurity framework for prioritizing and managing cyber risk with the fundamental approach of “Never Trust, Always Verify”. While traction for ZTA began in IT environments, we are starting to see proliferation into Operational Technology (OT) use cases and even callouts within OT-specific standards and regulations. Still there are many asset owners and owners with questions on the suitability of ZTA for OT and best way to operationalize the frameworks. Join Zero Trust and OT Security experts from Verizon and Palo Alto Networks to learn more about: - The cybersecurity and regulatory trends driving ZTA adoption - A 5-step approach for developing a Zero Trust Architecture - Insights from real world assessments on why ZTA is needed - How to implement change that is aligned with the needs of industrial environments - Practical Zero Trust OT security use cases from the perimeter to the core industrial networks - Use cases including third party remote access, visibility, network segmentation - Key takeaways and lessons learned

TOPICS:

End-to-End Autonomic Closed-Loop Security Management & Control for 5G Networks
The Webinar presents a Generic Framework for End-to-End (E2E) Autonomic (Closed-Loop) Security Assurance across 5G Network Segments, Slices, and even across Network Operators that is targeted for Standardization in ETSI based on a 5G PoC Project carried out by Industry Players and Checkpoint. The Webinar also presents how to achieve E2E Automated and Self-Adaptive Security Policy Management and Control (powered by Artificial Intelligence Models), based on the Framework. Steps to standardize the Generic Framework in ETSI will also be discussed.

TOPICS:

Cloud to Core to Edge: Making 5G End-to-End Network Slicing a Reality
Network slicing has been touted as a critical capability to unlocking the monetization of 5G. And yet, real-world examples of how to do this have been limited in both scope and capability. Part of the challenge has been the multi-domain and multi-vendor coordination required to achieve end-to-end network slices, as well as the deep expertise required across multiple technology silos. Participate in this unique opportunity to see how hot startups Kaloom and Itential join forces with Equinix to demonstrate an end-to-end customer solution for multi-customer network slicing. Come and learn about how: - The team achieved a per-tenant slice across a multivendor infrastructure including AWS cloud, Equinix ECX, Equinix Metal (bare metal servers) and a high-performance 5G UPF - The framework was automated for fast and error-free provisioning, enabling slice set-up in seconds and scalability across multiple customers - The solution was validated using simulated 5G traffic streams, demonstrating complete end-to-end functionality, including 5G local-breakout and hardware-accelerated 5G UPF for high-performance workloads For carriers contemplating roll-out of their 5G network slicing offerings, system integrators looking to do the same for their enterprise and carrier customers, and enterprises looking to leverage 5G technology for their own unique uses, this cutting-edge demonstration will inform, explain and spark innovation and thought.

TOPICS:

Coffee Talk: Digital Transformation & AIOps: The Future of IT
“Hmmm, I hadn’t thought of that!” When you implement AIOps, you’ll find yourself saying that often! The rise of automation has helped network operators do a better and better job optimizing their networks and providing reliable service. One of the most influential drivers of those improvements is you're learning more and more about your networks as you manage them, and applying that learning where and when you can. Thanks to Machine Learning (ML), Artificial Intelligence (AI) connected to your network learns more about it faster than we humans ever could. When such AI becomes one of your partners in managing the network, it is referred to as AIOps. AIOps collects, analyzes, and makes recommendations based on a variety of sources, including the network traffic itself, environmental factors, and data coming from other systems connected to yours. In many cases, AIOps will identify opportunities for network improvement that you hadn't thought of! In this session, we’ll examine the growth of AIOps, discussing not only how it can be applied to accelerate improvement to networks, but also how cautious humans can assure that it remains under control and positively productive.

TOPICS:

Demystifying Next-Gen NAC: The Fast Track to Optimizing Network Access Control 3
With steady adoption across industries as enterprises reduce network visibility and endpoint protection gaps, enable BYOD and guest access, fortify privacy compliance and mitigate new malware and IOT security risks, Network Access Control solutions have come of age. However there is still confusion on why, where and how to best apply NAC? In this webinar, we will look to demystify the next-generation of NAC and provide pragmatic insights on how to make informed decisions on selecting, implementing and optimizing your NAC. Key takeaways: • A look at the evolution of NAC, and the adopters, drivers, features and leaders of version 3.0 • Processes and application best practices on NAC deployments • How to achieve total user and endpoint visibility, and up-scaling device security • How your NAC can enable IoT identification and protection

TOPICS: