ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 4 days ago

New videos detected

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 1 week ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 1 week ago

New blog articles detected

  • Quantum Key Distribution: 101

    In today’s evermore networked society, data protection is a serious business. Security breaches lead to unwanted headlines and a loss of trust in enterprise organizations (such as banks or healthcare providers). Data security and keeping ahead of potential attackers, is a rapidly evolving field of development. Potential areas may involve safeguarding modern cloud computing environments or protecti...

  • Unlocking Innovation: Could Hackathons Be the Key?

    As engineers at a global company with competition around every corner, we believe that continuous innovation is the key to competitive differentiation. But innovation is an elusive thing and doesn’t appear on demand. The popular image we have when we think of innovation is that of the lone engineer having a light-bulb moment. Sometimes it does happen that way, but true light-bulb moments are unpre...

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 2 weeks ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 2 weeks ago

New blog articles detected

  • Welcome to the New Enterprise Edge

    One of the biggest challenges the enterprise faces with the advent of big data and the internet of things is what to do about the network edge. Emerging data patterns require an edge that is not only distributed across a wide area, largely on third-party infrastructure that is beyond the direct control of IT, but one that can handle a much broader set of responsibilities than traditional security ...

  • New Innovations in Green Data Centers

    Adoption of cloud computing has rapidly evolved from an emerging technology to an established networking solution. With each year, enterprise and government organizations place more and more of their mission-critical workloads into the cloud, while consumers benefit for the ubiquitous access to content and services, anywhere, anytime and on any device. Cloud adoption enables faster delivery of ser...

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 3 weeks ago

New blog articles detected

  • It's Time to Call Home

    NETCONF Call Home, or reverse secure socket shell (SSH), is a technique that enables network functions virtualization (NFV) and software-defined networking (SDN) devices to establish a connection to a service provider control systems and protects the virtual customer premises equipment (vCPE), usually deployed behind a cable modem or a firewall. According to the Internet Engineering Task Force (I...

  • How Can the Financial Industry Meet New Timestamping Regulations?

    Financial markets are currently governed by strict rules; one of these being the requirement to record when a deal has been brokered. Typically, the finance industry has logged this by day, date and time. However, new rules to be introduced in 2018 will mean much more stringent parameters are put in place. The US Securities and Exchange Commission will implement Rule 613 stipulating all machine-to...

  • 2017: Predictions of a Futurist

    It’s somewhat belated: But, I hope everyone had a fantastic Christmas and a fabulous New Year! Another Year With No Noteworthy Surprises It’s over – well, Christmas and New Year definitely is, but I’m referring to CES 2017. Personally, I’m not sure I would have had the energy to come straight from my New Year celebrations, still heavily intoxicated, and attend the annual conference with any amoun...

  • 2017: The Era of Enhanced Synchronization

    The new “enhanced” primary reference time clock (PRTC) recommendation from the International Telecommunication Union (ITU), G.8272.1, looks set to be one of this year’s key innovations in the world of network synchronization. Aimed at producing the levels of accuracy necessary for 5G, enhanced PRTCs (ePRTCs) go far beyond the current technology. While the time output of today’s PRTCs should be acc...

  • Bad Marriage: Botnets and the IoT Spell Big Danger

    Beginning a post on cyber security with the observation that the threat being discussed is frightening is a bit redundant. They all are frightening.  Very often, today’s threats are more dangerous because they are a mix of multiple things that, when combined, are more potent than the sum of their parts. In this case, four elements are present: botnets, DDoS attacks, the internet of things (IoT) a...

  • The Smart and the Not So Smart of CES 2017

    Each year starts with CES in which the world is introduced to thousands of new products, concepts and applications that are all designed to make our lives easier, safer, healthier, and happier. Many of these are truly innovations in technology; others might offer a “gee-whiz” moment of excitement; while some leave you simply asking why. So, we’ll take a look at some of the smart and not-so-smart d...

  • Operator Predictions for 2017

    I recently made my own predictions for 2017, so I thought it would be interesting to hear what some of my peers on the operator side had to say. Here’s what I found. Who I Talked to and My Methodology I asked 10 senior leaders about their views on the hottest technology or innovation in 2017. Here are the demographics: Geography: 7 US, 3 Europe (2 in APAC wanted to participate but we couldn’t work...

  • The Real Innovators of Networking: Todd McWhirter, Zayo Group

    For our latest discussion, Michael Ritter and I sat down with Todd McWhirter of Zayo Group to talk about the simplicity of Layer 1 encrypted services, the need for speed, and what today’s customers understand when it comes to data security. Prayson: Todd, could you tell us a little about Zayo’s primary business and about the verticals that Zayo is addressing? Todd: Zayo is a service provider in wh...

  • SD-WAN: Abstraction Over the Wide Area

    The enterprise is quickly learning what software-defined infrastructure can do for the data center. Now that the network can be provisioned as an abstract architecture along with compute and storage, organizations can finally rid themselves of the limitations that hardware places on data productivity. Few enterprises, however, rely solely on their own data center anymore. Advanced cloud environmen...

  • Closing the Security Gap: Automation and Trust at the Network Edge

    Unsecure edge devices are challenging our economies and our societies. We have experienced major hacking attacks on edge devices such as cameras and DSL routers. Both attacks targeted thousands of servers at the network edge by building a botnet for the orchestration of unprecedented denial of service attacks. Luckily, those breaches did not cause the devastating consequences they might have. But ...

  • Ensemble SmartWAN: Transforming SD-WAN

    Software-defined WAN (SD-WAN) offers enterprise users a way to implement virtual private networks (VPNs) at a much lower cost than today’s operator-managed Multiprotocol Label Switching (MPLS) VPNs. However, today’s SD-WAN solutions put the enterprise in charge of all aspects of the network, including local access and backbone transport. That may be too much of a management burden to take on for a...

  • Will the Real IoT Please Stand Up?

    The internet of things (IoT) hyperbole has taken an unexpected twist – very similar to my all-time favourite conundrum, which is, "How many mystery writers does it take to change a lightbulb?" Well, the answer is two, of course. You see, you have one to screw the bulb almost in and the second to give a surprise twist at the end.  Breaking News: This IoT Thing Isn’t New! Just like the surprise twis...

  • Back to the Future – Telco Style

    Many of us are old enough to remember the breakup of the AT&T System aka “Ma Bell.” The recent wave of consolidations is taking us back towards a more consolidated telco world. Ma Bell – 107 Years in the Making, 8 Years in the Breaking The Bell Telephone company was born in 1877 and was the parent of what became the Bell System. There was an initial breakup in 1956 when some international holdings...

  • The Dangers of Connected Vehicles

    The world of cybersecurity is a scary one. It’s especially so when it comes to vehicles. The reason is simple: In other areas of security, the end game generally is lost money or the inconvenience of getting a new credit card. In vehicle hacking, what’s at stake can actually be physical safety. It’s bad enough to lose a few bucks. It’s quite another thing to lose one’s brakes. The government is ta...

  • Building a One-Stop Shop for Edge Applications

    I’m a pretty tall person and a strong non-believer in the one-size-fits-all paradigm. That’s because it’s a compromise and compromises don’t tend to look good, feel good or work well. While it might serve the industry to increase the addressable market with a single product, the user usually doesn’t benefit so much. It’s a similar thing with cars. Daimler doesn’t produce just one Mercedes. Instead...

  • Why Link Monitoring Is Crucial for Managed Services

    Enterprise workloads are all about scale these days. Even without big data, the internet of things and increasing mobile traffic, IT infrastructure is being pushed to the limit just dealing with normal production environments and ecommerce. This is why the cloud has emerged as a lifesaver for many organizations. By simply spinning up new resources on third-party infrastructure where and when they ...

  • Northern Europe's Small Data Centers Are in a Uniquely Powerful Position

    In recent years, we’ve seen a huge boom in the number of businesses – both big and small – looking to invest in Nordic data centers. Perhaps the two most recognizable names to build facilities in and around the “Node Pole” are Google, which opened a huge data center in Hamina on Finland’s southern coastline, and Facebook, that opened its first data center outside the US in Luleå, Sweden. The rush ...

  • Innovation Will Be Key to Achieving Broadband for All

    Most of us enjoy our broadband connectivity through traditional methods of fixed (DSL, cable, fiber) or wireless (3G/4G, satellite, FWA). However, there remains a significant portion of the world’s population where those methods of connectivity are either impractical or simply too expensive to pursue. According to the latest ITU estimates, there will be 3.5 billion people online by the end of 2016...

  • Are We Entering the 10 Gig Era?

    A few years ago, gigabit broadband service was still considered science-fiction: only a few places had it, like Japan, Korea or Sweden, and to most of the world it seemed so insanely better than whatever broadband speeds they had available that no one dared to dream that it would become mainstream one day. And yet, in just a few years, gigabit has become a common offering. It’s far from universall...

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 3 weeks ago

New videos detected

  • Meet Jen and a New Era of Phase Synchronization

    Are you able to seize the full potential of your LTE-Advanced network? Are you able to fully utilize your spectrum? Are your customers happy with your service? If not, your phase synchronization may be holding you back. With our Syncjack™ technology, you’re able to monitor the accuracy of your network's clocks every minute of every day. A new era of phase synchronization has arrived.

  • Tomorrow Together (Vol. 6)

    We’re a company that believes in people, a company that believes in their potential. We empower our team every step of the way. There are no limitations here. We aim high and achieve the incredible.

  • How Does NFV Impact Demarcation Technology?

    Ulrich Kohn examines how our One Network Edge technology enables communication service providers to deliver NFV services that meet exacting customer demands.

  • Tomorrow Together (Vol. 5)

    We’re a company that believes in people, a company that believes in their potential. We empower our team every step of the way. There are no limitations here. We aim high and achieve the incredible.

  • What's the Best Way to Connect Cell Sites?

    Ulrich Kohn examines how our One Network Edge solutions help connect cell sites in the most effective, secure and synchronized way.

  • A Year of Major Milestones

    2016 was a year of new beginnings, of realizing our true potential. Our team worked harder than ever before and the world took notice. Our voice has never been so strong. Together, there’s nothing we can’t do.

  • Why Should Encryption Always Be On?

    Ulrich Schlegel explains why our ConnectGuard™ technology uses always-on encryption and what this means for your data and your networks.

  • How Can You Monitor Unpowered Sites?

    Ulrich Kohn examines how our ALM technology can help communication service providers monitor unpowered sites in the simplest and most efficient way possible.

  • Why Are Fiber Assurance Solutions So Important for Service Providers?

    Ulrich Kohn examines the importance of fiber assurance solutions and explores how they help communication service providers improve network performance and integrity.

  • How Do We Support the Three Pillars of Network Security?

    Ulrich Schlegel discusses the importance of confidentiality, authenticity and integrity in network security and how our data transport technology has been specifically designed to exceed each and every aspect.

  • Introducing One Network Edge

    Our One Network Edge is a first for the networking industry. Whether you need service demarcation, application hosting, security or synchronization delivery, our One Network Edge provides you with a one-stop shop. It’s time to set aside today’s complex and fragmented approach and embrace a new era of simplicity and opportunity.

  • Ensemble Analytics Explained

    Prayson Pate explains how Ensemble Analytics can help operators to maximise their virtualized services and ensure that they’re providing real value.

  • Ensemble Director Explained

    Prayson Pate explains how Ensemble Director can help operators to create and deploy virtualized services in existing IT infrastructures.

  • What Is Cloud in a Box?

    Prayson Pate explores how a cloud-in-a-box approach addresses key OpenStack issues and helps to bring the power of the cloud to the telecom network.

  • A New Era of Fiber Assurance Has Arrived

    ALM is a landmark in our industry. Our advanced link monitoring solution makes effective real-time monitoring of access and metro networks affordable to everyone.

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 5 months ago

New videos detected

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 5 months ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • Virtualization Key to Smart Cities

    When I first wrote about smart cities for this blog back in 2013, the concept was still very much just that – a concept. Fast forward to today and nearly every city, both large and small, is developing and perhaps even implementing plans to make their cities smarter. Over these few years, the key drivers and motivations for moving towards a smart city environment have remained unchanged. For many ...

  • Open Mobile Networks - Dismantling the Last Fortress of Monolithic Networking

    Different Routes to Openness in Fixed and Mobile Fixed and mobile networks have historically differed in the way they are standardized, regulated, designed and implemented – until today.  The advent of technologies such as NFV and SDN is driving them towards convergence, resulting in the Mobile Edge Computing (MEC) initiative. The first big difference in fixed and wireless networks is in how they ...

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 5 months ago

New blog articles detected

  • The Real Innovators of Networking: Peter Klostermaier, Computacenter

    For this post, Michael Ritter and I talked with Peter Klostermaier of Computacenter about the need to integrate the five areas of security, the importance of protecting data as it leaves the premises and how the “Snowden effect” has changed attitudes to data protection. Prayson: Could you tell us a little bit about what Computacenter does and, in particular, how you’re driving innovations in secur...

  • The Value of Universal Communications

    Last year, in the context of the EU Telecom Review, I wrote extensively on the issue of "substitutable" telecom services. The EU wanted to assess which online services could be functional substitutes to phone and messaging services and how to regulate them. The topic is far from dead (and has recently been addressed in the context of national security snooping) but I wanted to tackle here a subset...

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 5 months ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 5 months ago

ADVA Optical Networking

Category: Content
Type: Youtube Video

Generated 5 months ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 6 months ago

ADVA Optical Networking

Category: Content
Type: Blog Article

Generated 6 months ago

New blog posts detected

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in