NFV in Action: Where to see Titanium Server before the end of the year
By Jeff Gowan The telecom industry is eagerly working towards NFV. With NFV, by taking advantage of a virtualized environment, carriers can easily and rapidly introduce new services while reducing...
View ArticleGremlin Free Zone
By Ron Breault I recently conducted a live demo of our Wind River Titanium Server product during one of SDNCentral’s DemoFridays. This was a great way to reach a wide and highly relevant audience (and...
View ArticleCelebrations and Struggles at NFV #8
By Ron Breault I’ve attended every ETSI NFV Plenary session since April of 2013 – that’s seven in total – and I’d venture to say that the recently concluded NFV #8 was the most raucous to date! To be...
View ArticleIntel DPDK – A Technology that is Thriving
By Andreea Volosincu For far too many times, the world of open source software gives way to a plethora of standards and reference designs that are supposed to make users’ life easier, improve...
View ArticleThe Three Pillars of “Open” NFV Software
By Charlie Ashton In retrospect, 2014 was the year when the topic of “openness” became part of any conversation about solutions for Network Functions Virtualization (NFV). Throughout industry...
View ArticleNFV and Shanghai – Much In Common
By Ron Breault I recently returned from an ETSI NFV event in Shanghai – a focused meeting of the IFA (Interfaces and Architecture) Working group. IFA is easily the largest working group in NFV Phase...
View ArticleDeciding if Open Source is Good for Your Business
By Andreea Volosincu Switching to Open Source – it’s what economists identify as a dynamic choice. Unlike its old-fashioned sisters, the static choices, dynamic choices made today can affect the...
View ArticleWind River Platform for Infotainment Achieves GENIVI 7 Compliance
By Franz Walkembach Wind River, one of the founding members of GENIVI Alliance and a Leader in delivering software for intelligent connected systems, has enhanced its In-Vehicle Infotainment (IVI)...
View ArticleLong Live the New LTS Kernel
By Andreea Volosincu It’s the most wonderful time of the year again! No, it’s not Christmas, but the beginning of a new cycle in the Linux microcosm. A few days ago, the Linux 4.1 kernel has been...
View ArticleHow To Get Started With Embedded Virtualization
By Mark Hermeling Embedded virtualization provides a lot of benefits. Being able to consolidate multiple workloads on a single multi-core device helps reduce capital expenses and operating expenses,...
View ArticleWill OPNFV become the de facto standard for NFV compatibility?
By Charlie Ashton As Network Functions Virtualization (NFV) takes its first steps beyond trials and evaluations into real-world deployments, suppliers throughout the value chain are wrestling with how...
View ArticleTwo to Tango: When Hardware Met Software
By Andreea Volusincu Try going incognito on Google (as if you’re on a covert mission), and type “Why is embedded software so” and see what you get. It’s an interesting a dilemma. Autocomplete is a...
View ArticleWhat does “open” really mean in the context of NFV?
By Charlie Ashton 2015 was certainly an interesting year for Network Functions Virtualization (NFV). It was the year when it became clear that the early use cases will likely be virtual CPE...
View ArticleMore than NFV: Transformations in Networking Bring Challenges and Opportunities
By Charlie Ashton With all the industry hype around Network Functions Virtualization (NFV), it’s easy to lose track of the fact that telecom infrastructure is not the only segment of the networking...
View ArticleWhat is CVE-2015-7547?
By Andreea Volosincu Some of the uncovered common vulnerabilities capture the world’s attention to the point of being attributed a nickname (e.g. heartbleed). Others are fixed and get popular just in...
View ArticleAre you DROWNing?
By Mark Hatle An attack on the SSLv2 protocol, was disclosed this week by security researchers. Visit https://drownattack.com if you want to get straight to the scoop. This is yet another in a long...
View ArticleSecurity Vulnerabilities with Fingerprinting: Linux Considerations
By Tim Radzykewycz Various tools, such as nmap, can be used to help determine what operating system a particular computer is running, based on the network responses it generates to crafted network...
View ArticleCan OpenStack Be Viable For Virtual CPE?
By Charlie Ashton Virtual Customer Premise Equipment (vCPE) is a hot topic right now for companies focused on business opportunities in network virtualization. IHS Infonetics surveyed service providers...
View ArticleWhich Virtualization Strategy is Right for You?
By Chip Downing Advances in microprocessor technology now enable embedded and IoT designers to create very powerful solutions by integrating both information technology (IT) and operational technology...
View ArticleAccelerated Virtual Routing Makes OpenStack More Cost-Effective
By Charlie Ashton In a recent post we outlined some of the approaches we’re taking to solve OpenStack-related problems and thereby enable it to become a viable solution for VM orchestration in telco...
View Article
More Pages to Explore .....