NFV

How to sell NFV

Is Network Function Virtualization (NFV) a market inflection point, or just an over hyped technology in search of a use case? NFV is designed...

Delivering highly flexible network services for real-time consumption with NFV

Emerging markets come in all shapes and sizes, but something as profound to an industry as Network Function Virtualization (NFV) faces enormous scrutiny from...

Uber-less Austin virtually full of common themes at Light Reading’s BCE

In the “Silicon Hills” capital of the deep South, the world of technology movers and shakers descended upon Austin’s Convention Center for Light Reading’s...

Carrier deployments of Openstack and NFV move from science project to global rollout

After lots of good BBQ and craft beer in Austin last week, I’ve had a chance to reflect on what I saw at the...

NFV World Congress: vCPE and Easy Wins

Attending the NFV World Congress last week gave me a chance to talk to many carriers about their migration into a virtualized...

The ADC is a Force Multiplier for NFV

The IT industry is moving towards virtualization and software-defined .  IT architects are realize that management and orchestration systems are required ...

The Importance of an Open Source MANO Community

Telephonica recently joined the ranks of 22 service providers and ISPs in creating an Open Source MANO Community.  Radware is also a...

Mobile World Congress 2016 Recap

After all the meetings have finished, the jamon has been eaten, Rioja has been drunk and all the world’s Mobile Carriers have returned from...

Eliminate the Service Roll-Out Bottleneck with NFV

Big-bandwidth applications are the tools your customers rely on to get things done. They don’t have time to wait through the typical six months...

Why Every Network Needs a Doctor

Every year, I go to my doctor for my annual physical.  My doctor goes through a standard series of procedures every time.  He asks...

The NFV Carrier Opportunity – Takeaways from Light Reading’s Big Telecom Event

On Tuesday June 9th, I presented at Light Reading’s Big Telecom Event and spoke about NFV in the mobile network. The event hosted a...

Does NFV Have a Place in the Enterprise?

Jim Metzler is a Distinguished Research Fellow and Co-Founder of Ashton Metzler & Associates and is a featured guest blogger. Many people associate NFV exclusively...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.