Ciena stands to be a winner because it competes with ZTE. Infinera and Nokia might benefit as well.
War and the battlefield themes dominated the opening keynotes at the annual RSA Conference 2018, just a day after a joint U.S. and U.K. alert warned that Russians are targeting American and British organizations’ network infrastructure devices, such as routers.
The new platform allows the company to get into the application space and diversify operations away from the increasingly competitive infrastructure space around OpenStack and Kubernetes.
Cisco, itself, recently issued a warning about its Smart Install client, saying it was vulnerable to cyber attacks by nation-state actors.
Cisco expects the ratio of IT people to devices to increase from 1 to 1,000 to 1 to 100,000 in just a couple of years.
The company claims its platform is the only one that can run both Swarm and Kubernetes in the same cluster.
The time for researching NFV is over for some end-users who are either moving forward to the trial phase or dropping the technology, at least for the time being.
The security product exposes an API to accept workload context from container orchestration systems.
The SD-storage vendor will invest the funding in its multi-cloud controller software, which it plans to launch commercially later this year.
The Azure Sphere technology includes a thumbnail-sized micro-controller unit, a Linux-based operating system, and a cloud-based security service.
SDN and NFV are a reality today, but is it the reality that the industry wanted? It's up to the SDN community to set realistic expectations and be candid about the challenges.
The companies completed live tests of 5G in a Toronto stadium and plan to continue testing in other Canadian cities over the next year.
The company is looking to support unmodified big data software in containers so data scientists can spend their time analyzing data rather than fighting hardware and drivers.
A U.K. government agency is also recommending that telcos not purchase equipment from ZTE.
An IBM security report found a 424-percent jump in breaches related to misconfigured cloud infrastructure in 2017, largely due to human error.
Making that digital transition will not be simple. Take advantage of the resources available on the Verizon Enterprise Solutions channel and learn how to drive positive results while maintaining the security of your network
It added new email security services, visibility and malware protection features, and managed security offerings through IT services company ConnectWise.
This technology uncovered last year’s Dragonfly 2.0 attacks targeting energy companies to gain access to the power grid.
These three initiatives are all focused on virtualizing the RAN, and some of the same companies belong to all three groups. But why are there three?
Will speakers at the upcoming Cloud Foundry Summit provide real insight into how to solve container deployment challenges?