So how many of you go on a business trip to another country only to find upon your return the shock of a lifetime, your phone bill? I know that I have and instead of the promises of lower prices from the big operators, you get hit with roaming surcharges and the like? C’mon you know that you have.
Tuesday, 29 August 2017
Friday, 25 August 2017
Network Slicing in Action
One particular aspect of mobile network evolution that deserves attention is the idea of reducing round-trip time (RTT) between consumers of a service and the service source itself. So much so that in 5G, this concept has acquired its own unique 3GPP term: URLLC which is an acronym for Ultra-Reliable Low Latency Communications. Cisco envisions, as does AT&T among other leading carriers that low latency communications will enable a new class of network services characterized by tight control loops involving Augmented Reality (AR), Virtual reality (VR) and even haptic communications triggered by the immediate network response to a touch event. Cisco is excited about these possibilities and is pursuing an aggressive mobile network evolution strategy designed to deliver an end-to-end system architecture enabling low latency capabilities. But amidst all of this, it is probably worth unpacking the basics so that we can develop an understanding of what is truly needed and how we can help carriers realize the end-game.
Cisco Accelerates Cloud Native vDRA and Scoops up Two North America Wins
People today use their mobile devices anytime, any place, and anywhere and According to the Global mobile Suppliers Association (GSA) today there are still more than 800 mobile operators investing in LTE. There are also close to 600 additional LTE networks that have been commercially launched and another 60 are still being built out. Growth in LTE is being driven by all types of intelligent devices such as smartphones, tablets, PCs, and IoT Devices are some of the big growth drivers. Adoption of Voice-over-LTE (VoLTE) and Voice-over-Wi-Fi (VoWi-Fi) is also extremely high and growing. This growth has caused a tremendous amount of new signaling traffic that needs to also be addressed with a new signaling architecture.
Wednesday, 23 August 2017
Introducing New Enterprise Controls for Cisco Spark
Making the Impossible, Possible
Last year, one of my colleagues went to a start-up conference with 2,000 people. On stage, someone asked the audience how many were working on consumer apps. Almost everyone raised their hands. Then the person asked how many were working on enterprise apps. This time only three hands went up. Three.
Tuesday, 22 August 2017
How Your Network Just Became the Smartest Student in the Class
The Network. Intuitive. is a complete transformation in hardware, software, and management that will change how networks operate, enabling them to adapt in real time with artificial intelligence (AI), and delivering the secure foundation for our digital world, faster and more securely, all while driving down operational cost. This new era in programmable networking leverages machine learning and analytics to deliver a new level of intelligence at the core of any organization. So, what does that mean for the future of Digital Education?
Sunday, 20 August 2017
Service Provider Security Architecture – Part 2
In my earlier blog post, I described the need for pervasive security and architectural approaches to enable secure, agile services against increasingly sophisticated attackers. Pervasive security is critical to the Open Network Architecture (ONA).
Saturday, 19 August 2017
Service Provider Security Architecture – Part 1
There has never been a more interesting time to be a Service Provider. Today, we are in the midst of a once in a generation transition in technology that we last saw with the birth of the internet. Today, the exponential growth in hyper-connectivity, the services that evolve upon it and the dawn of the Internet of Things demand a next generation of flexible and dynamic infrastructure. To power this new epoch in infrastructure, Service Providers are grappling with the promise and challenge of such technologies as virtualization and orchestration. Compounding this challenge is the need to maintain the security of this critical infrastructure and the confidentiality, integrity and availability of the information that resides upon it. Service Providers are well aware of this requirement and have traditionally built architectures that focused on enforcement of the security perimeter.