Advancing 5G with cloud-native networking and intelligent infrastructure

equinix
The success of 5G technology is a function of both the infrastructure that supports it and the ecosystems that enable it. Today, the definitive focus in the 5G space is on enterprise use cases, ranging from dedicated private 5G networks to accessing edge compute infrastructure and public or private clouds from the public 5G network. As a result, vendor-neutral multitenant data center providers and their rich interconnection capabilities are pivotal in helping make 5G a reality. This is true both in terms of the physical infrastructure needed to support 5G and the ability to effectively connect enterprises to 5G.
Industry experts expect 5G to enable emerging applications such as virtual and augmented reality (AR/VR), industrial robotics/controls as part of the industrial internet of things (IIoT), interactive gaming, autonomous driving, and remote medical procedures. These applications need a modern, cloud-based infrastructure to meet requirements around latency, cost, availability and scalability. This infrastructure must be able to provide real-time, high-bandwidth, low-latency access to latency-dependent applications distributed at the edge of the network.

How Equinix thinks about network slicing
Network slicing refers to the ability to provision and connect functions within a common physical network to provide the resources necessary to deliver service functionality under specific performance constraints (such as latency, throughput, capacity and reliability) and functional constraints (such as security and applications/services). With network slicing, enterprises can use 5G networks and services for a wide variety of use cases on the same infrastructure.

Providing continuity of network slices with optimal UPF placement and intelligent interconnection
Mobile traffic originates in the mobile network, but it is not contained to the mobile network domain, because it runs between the user app on a device and the server workload on multi-access edge compute (MEC) or on the cloud. Therefore, to preserve intended characteristics, the slice must be extended all the way to where the traffic wants to go. This is why we like to say “the slicing must go on.”

The placement of network functions within the slice must be optimized relative to the intended traffic flow, so that performance can be ensured end-to-end. As a result, organizations must place or activate the user plane function (UPF) in optimal locations relative to the end-to-end user plane traffic flow.

We expect that hybrid and multicloud connectivity will remain a key requirement for enterprises using 5G access. In this case, hybrid refers to private edge computing resources (what we loosely call “MEC”) located in data centers—such as Equinix International Business Exchange™ (IBX®) data centers—and multicloud refers to accessing multiple cloud providers from 5G devices. To ensure both hybrid and multicloud connectivity, enterprises need to make the UPF part of the multidomain virtual Layer 2/Layer 3 interconnection fabric.

Because a slice must span multiple domains, automation of UPF activation, provisioning and virtual interconnection to edge compute and multicloud environments is critical.

Implementing network slicing for interconnection of core and edge technology
Equinix partnered with Kaloom to develop network slicing for interconnection of core and edge (NICE) technology within our 5G and Edge Technology Development Center (5G ETDC) in Dallas. NICE technology is built using cloud-native network fabric and high-performance 5G UPF from Kaloom. This is a production-ready software solution, running on white boxes built with P4 programmable application-specific integrated circuits (ASICs), allowing for deep network slicing and support for high-performance 5G UPF with extremely fast data transfer rates.

With NICE technology in the 5G ETDC, Equinix demonstrates:
  • 5G UPF deployment/activation and traffic breakout at Equinix for multiple slices.
  • Software-defined interconnection between the 5G core and MEC resources from multiple providers.
  • Software-defined interconnection between the 5G core and multiple cloud service providers.
  • Orchestration of provisioning and automation of interconnection across the 5G core, MEC and cloud resources.
  • Architecture of NICE technology in the Equinix 5G ETDC
  • The image above shows (from left to right):
  • The mobile domain with radio access network (RAN), devices (simulated) and mobile backhaul connected to Equinix.
  • The Equinix domain with:
  • Equinix Metal® supporting edge computing servers and a fabric controller from Kaloom.
  • Network slicing fabric providing interconnection and Layer 2/Layer 3 cloud-native networking to dynamically activate UPF instances/interfaces connected with MEC environments and clouds, forming two slices (shown above in blue and red).
  • Equinix Fabric™ and multicloud connectivity.

This demonstrates the benefit of having the UPF as a feature of the interconnection fabric, effectively allowing UPF activation as part of the virtual fabric configuration. This ultimately enables high-performance UPF that’s suitable for use cases such as high-speed 5G fixed wireless access.

Combining UPF instances and MEC environments into an interconnection fabric makes it possible to create continuity for the slices and influence performance and functionality. Equinix Fabric adds multicloud connectivity to slices, enabling organizations to directly integrate network slicing with their mobile hybrid multicloud architectures.

Successful private 5G edge deployments deliver value in several ways. Primarily, they offer immediate access to locally provisioned elastic compute, storage and networking resources that deliver the best user and application experiences. In addition, they help businesses access a rich ecosystem of partners to unlock new technologies at the edge.

Secure, reliable connectivity and scalable resources are essential at the edge. A multivendor strategy with best-of-breed components complemented by telemetry, advanced analytics with management and orchestration—as demonstrated with NICE in Equinix data centers—is a most effective way to meet those requirements. With Equinix’s global footprint of secure, well-equipped facilities, customers can maximize benefits.”

- Suresh Krishnan, CTO, Kaloom

Equinix and its partners are building the future of 5G
NICE technology is just one example of how the Equinix 5G and Edge Technology Development Center enables the innovation and development of real-world capabilities that underpin the edge computing and interconnection infrastructure required to successfully implement 5G use cases. A key benefit of the 5G ETDC is the ability to combine cutting-edge innovations from our partners like Kaloom with proven solutions from Equinix that already serve a large ecosystem of customers actively utilizing hybrid multicloud architectures.

Spotlight

Zensoft Services

We are an independent software testing and test automation services company.Excellence, enthusiasm and passion to envision smart software for a smarter world through disruptive, resilient and insightful testing and test automation solutions is what describes us best.

OTHER ARTICLES
Application Infrastructure

Adapting Hybrid Architectures for Digital Transformation Implementation

Article | August 3, 2022

For the majority of businesses, digital transformation (DX) has emerged as a significant priority. By incorporating digital technologies into all aspects of an organization's operations, digital transformation is a continuous process that alters how organizations operate as well as how they supply goods and services to customers and connect with them. Employing hybrid network infrastructures can aid businesses in putting DX strategies into action. An IT architecture and environment is a hybrid infrastructure that combines on-premises data centers with private or public clouds. Operating systems and applications can be deployed anywhere in this environment, depending on the needs and specifications of the firm. Managing and keeping an eye on an organization's whole IT infrastructure requires the use of hybrid IT infrastructure services, sometimes referred to as cloud services. Given the complexity of IT environments and needs, this is essential for digital transformation. What Does Hybrid Network Infrastructure Have To Offer? Flexibility Companies can employ the appropriate tools for the job, thanks to flexibility. For instance, a business needs access to a lot of data if it wants to use machine learning (ML) or artificial intelligence (AI). Utilizing public cloud services like AWS or Azure can help with this. However, these services might be pricey and not provide the performance required for some applications. Durability Hybrid networks are more tolerant of interruptions. For instance, a business can continue to function if there is a problem with its public cloud by using its private data center. This is due to the fact that the outage in the public cloud has no impact on the private data center. Security Businesses can utilize a hybrid cloud strategy to protect sensitive data while utilizing the resources and services of a public cloud, potentially lowering the chance of crucial information being compromised. While analytics and applications that use data kept in a private environment will probably still need to function in a public cloud, you can use encryption techniques to reduce security breaches. Scalability and Efficiency Traditional networks can't match the performance and scalability of hybrid networks. This is due to the fact that public clouds offer enormous bandwidth and storage that may be used as needed. By using a hybrid architecture, a company can benefit from the public cloud's flexibility and capacity while still keeping its business-critical data and operations in the private cloud or on-premises data center. Conclusion A cultural shift toward more flexible and intelligent ways of conducting business, supported by cutting-edge technology, involves integrating digital technologies throughout all company activities, improving current processes, developing new operational procedures, and offering higher value to clients. Infrastructures for hybrid networks are necessary for the success of digital transformation.

Read More
Application Infrastructure

The Drive with Direction: The Path of Enterprise IT Infrastructure

Article | July 16, 2022

Introduction It is hard to manage a modern firm without a convenient and adaptable IT infrastructure. When properly set up and networked, technology can improve back-office processes, increase efficiency, and simplify communication. IT infrastructure can be utilized to supply services or resources both within and outside of a company, as well as to its customers. IT infrastructure when adequately deployed aids organizations in achieving their objectives and increasing profits. IT infrastructure is made up of numerous components that must be integrated for your company's infrastructure to be coherent and functional. These components work in unison to guarantee that your systems and business as a whole run smoothly. Enterprise IT Infrastructure Trends Consumption-based pricing models are becoming more popular among enterprise purchasers, a trend that began with software and has now spread to hardware. This transition from capital to operational spending lowers risk, frees up capital, and improves flexibility. As a result, infrastructure as a service (IaaS) and platform as a service (PaaS) revenues increased by 53% from 2015 to 2016, making them the fastest-growing cloud and infrastructure services segments. The transition to as-a-service models is significant given that a unit of computing or storage in the cloud can be quite cheaper in terms of the total cost of ownership than a unit on-premises. While businesses have been migrating their workloads to the public cloud for years, there has been a new shift among large corporations. Many companies, including Capital One, GE, Netflix, Time Inc., and others, have downsized or removed their private data centers in favor of shifting their operations to the cloud. Cybersecurity remains a high priority for the C-suite and the board of directors. Attacks are increasing in number and complexity across all industries, with 80% of technology executives indicating that their companies are unable to construct a robust response. Due to lack of cybersecurity experts, many companies can’t get the skills they need on the inside, so they have to use managed security services. Future of Enterprise IT Infrastructure Companies can adopt the 'As-a-Service' model to lower entry barriers and begin testing future innovations on the cloud's basis. Domain specialists in areas like healthcare and manufacturing may harness AI's potential to solve some of their businesses' most pressing problems. Whether in a single cloud or across several clouds, businesses want an architecture that can expand to support the rapid evolution of their apps and industry for decades. For enterprise-class visibility and control across all clouds, the architecture must provide a common control plane that supports native cloud Application Programming Interfaces (APIs) as well as enhanced networking and security features. Conclusion The scale of disruption in the IT infrastructure sector is unparalleled, presenting enormous opportunities and hazards for industry stakeholders and their customers. Technology infrastructure executives must restructure their portfolios and rethink their go-to-market strategies to drive growth. They should also invest in the foundational competencies required for long-term success, such as digitization, analytics, and agile development. Data center companies that can solve the industry's challenges, as well as service providers that can scale quickly without limits and provide intelligent outcome-based models. This helps their clients achieve their business objectives through a portfolio of 'As-a-Service' models, will have a bright future.

Read More
Application Infrastructure, Application Storage

Ensuring Long-Term Reliability of Technology Partners using HCI

Article | July 19, 2023

Building trust through HCI by unveiling strategies to ensure the long-term reliability of technology partnerships, cementing lasting collaborations in a dynamic business landscape through vendor stability. Contents 1. Introduction 2. How HCI Overcomes Infrastructural Challenges 3. Evaluation Criteria for Enterprise HCI 3.1. Distributed Storage Layer 3.2. Data Security 3.3. Data Reduction 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners 4.1. Vendor Track Record 4.2. Financial Stability 4.3. Customer Base and References 4.4. Product Roadmap and Innovation 4.5. Support and Maintenance 4.6. Partnerships and Ecosystem 4.7. Industry Recognition and Analyst Reports 4.8. Contracts and SLAs 5. Final Takeaway 1. Introduction When collaborating with a vendor, it is essential to evaluate their financial stability. This ensures that they are able to fulfil their obligations and deliver the promised services or goods. Prior to making contractual commitments, it is necessary to conduct due diligence to determine a vendor's financial health. This article examines when a vendor's financial viability must be evaluated, why to do so, and how vendor and contract management software can assist businesses. IT organizations of all sizes face numerous infrastructure difficulties. On one hand, they frequently receive urgent demands from the business to keep their organization agile and proactive while implementing new digital transformation initiatives. They also struggle to keep their budget under control, provide new resources swiftly, and manage the increasing complexity while maintaining a reasonable level of efficiency. For many organizations, a cloud-only IT strategy is not a viable option; as a result, there is a growing interest in hybrid scenarios that offer the best of both realms. By combining cloud and traditional IT infrastructures, there is a real danger of creating silos, going in the incorrect direction, and further complicating the overall infrastructure, thereby introducing inefficiencies. 2. How HCI Overcomes Infrastructural Challenges Hyper-converged infrastructures (HCI) surpass conventional infrastructures in terms of simplicity and adaptability. HCI enables organizations to conceal the complexity of their IT infrastructure while reaping the benefits of a cloud-like environment. HCI simplifies operations and facilitates the migration of on-premises data and applications to the cloud. HCI is a software-defined solution that abstracts and organizes CPU, memory, networking, and storage devices as resource pools, typically utilizing commodity x86-based hardware and virtualization software. It enables the administrator to rapidly combine and provision these resources as virtual machines and, more recently, as independent storage resources such as network-attached storage (NAS) filers and object stores. Management operations are also simplified, allowing for an increase in infrastructure productivity while reducing the number of operators and system administrators per virtual machine managed. HCI market and itssolutions can be categorized into three groups: Enterprise Solutions They have an extensive feature set, high scalability, core-to-cloud integrations, and tools that extend beyond traditional virtualization platform management and up the application stack. Small/Medium Enterprise Solutions Comparable to the previous category, but simplified and more affordable. The emphasis remains on simplifying the IT infrastructure for virtualized environments, with limited core-to-cloud integrations and a limited ecosystem of solutions. Vertical Solutions Designed for particular use cases or vertical markets, they are highly competitive in edge-cloud or edge-core deployments, but typically have a limited ecosystem of solutions. These solutions incorporate open-source hypervisors, such as KVM, to provide end-to-end support at lower costs. They are typically not very scalable, but they are efficient from a resource consumption standpoint. 3. Evaluation Criteria for Enterprise HCI 3.1 Distributed Storage Layer The distributed storage layer provides primary data storage service for virtual machines and is a crucial component of every HCI solution. Depending on the exposed protocol, they are typically presented as a virtual network-attached storage (NAS) or storage area network (SAN) and contain all of the data. There are three distributed storage layer approaches for HCI: Virtual storage appliance (VSA): A virtual machine administered by the same hypervisor as the other virtual machines in the node. A VSA is more flexible and can typically support multiple hypervisors, but this method may result in increased latency. Integrated within the hypervisor or the Operating System (OS): The storage layer is an extension of the hypervisor and does not require the preceding approach's components (VM and guest OS). The tight integration boosts overall performance, enhances workload telemetry, and fully exploits hypervisor characteristics, but the storage layer is not portable. Specialized storage nodes: The distributed storage layer is comprised of specialized nodes in order to achieve optimal performance consistency and scalability for both internal and external storage consumption. This strategy, which is typically more expensive than the alternatives for lesser configurations, is utilized. 3.2 Data Security Currently, all vendors offer sophisticated data protection against multiple failures, such as full node, single, and multiple-component issues. Distributed erasure coding safeguards information by balancing performance and data footprint efficiency. This equilibrium is made possible by modern CPUs with sophisticated instruction sets, new hardware such as NVMe and storage-class memory (SCM) devices, and data path optimizations. In addition, the evolution of storage technologies has played a pivotal role in enhancing data protection strategies. The introduction of high-capacity SSDs (Solid-State Drives) and advancements in storage virtualization have further strengthened the ability to withstand failures and ensure uninterrupted data availability. These technological innovations, combined with the relentless pursuit of redundancy and fault tolerance, have elevated the resilience of modern data storage systems. Furthermore, for data protection and security, compliance with rules, regulations, and laws is paramount. Governments and regulatory bodies across the globe have established stringent frameworks to safeguard sensitive information and ensure privacy. Adherence to laws such as the General Data Protection Regulation (GDPR) in Europe, the Health Insurance Portability and Accountability Act (HIPAA) in the United States, and various industry-specific regulations is non-negotiable. Organizations must fortify their data against technical vulnerabilities and align their practices with legal requirements to prevent costly fines, legal repercussions, and reputational damage. 3.3 Data Reduction Optimization of the data footprint is a crucial aspect of hyper-converged infrastructures. Deduplication, compression, and other techniques, such as thin provisioning, can significantly improve capacity utilization in virtualized environments, particularly for Virtual desktop infrastructure (VDI) use cases. Moreover, in order to optimize rack space utilization and achieve server balance, the number of storage devices that can be deployed on a single HCI node is restricted. 4. Assessing Vendor Stability: Ensuring Long-Term Reliability of Partners Here are some key factors that contribute to ensuring long-term reliability: 4.1 Vendor Track Record Assessing the vendor's track record and reputation in the industry is crucial. Look for established vendors with a history of delivering reliable products and services. A vendor that has been operating in the market for a significant period of time and has a strong customer base indicates stability. 4.2 Financial Stability Consider factors such as the vendor's profitability, revenue growth, and ability to invest in research and development. Financial stability ensures the vendor's ability to support their products and services over the long term. 4.3 Customer Base and References Look at the size and diversity of the vendor's customer base. A large and satisfied customer base indicates that the vendor's solutions have been adopted successfully by organizations. Request references from existing customers to get insights into their experience with the vendor's stability and support. 4.4 Product Roadmap and Innovation Assess the vendor's product roadmap and commitment to ongoing innovation. A vendor that actively invests in research and development, regularly updates their products, and introduces new features and enhancements demonstrates a long-term commitment to their solution's reliability and advancement. 4.5 Support and Maintenance Evaluate the vendor's support and maintenance services. Look for comprehensive support offerings, including timely bug fixes, security patches, and firmware updates. Understand the vendor's service-level agreements (SLAs), response times, and availability of technical support to ensure they can address any issues that may arise. 4.6 Partnerships and Ecosystem Consider the vendor's partnerships and ecosystem. A strong network of partners, including technology alliances and integrations with other industry-leading vendors, can contribute to long-term reliability. Partnerships demonstrate collaboration, interoperability, and a wider ecosystem that enhances the vendor's solution. 4.7 Industry Recognition and Analyst Reports Assess the vendor's industry recognition and performance in analyst reports. Look for accolades, awards, and positive evaluations from reputable industry analysts. These assessments provide independent validation of the vendor's stability and the reliability of their HCI solution. 4.8 Contracts and SLAs Review the vendor's contracts, service-level agreements, and warranties carefully. Ensure they provide appropriate guarantees for support, maintenance, and ongoing product updates throughout the expected lifecycle of the HCI solution. 5. Final Takeaway Evaluating a vendor's financial stability is crucial before entering into contractual commitments to ensure their ability to fulfill obligations. Hyper-converged infrastructure overcomes infrastructural challenges by simplifying operations, enabling cloud-like environments, and facilitating data and application migration. The HCI market offers enterprise, small/medium enterprise, and vertical solutions, each catering to different needs and requirements. Analysing enterprise HCI solutions requires careful consideration of various criteria. Each approach has its own advantages and considerations related to flexibility, performance, and cost. The mentioned techniques can significantly reduce the data footprint, particularly in use cases like VDI, while maintaining performance and efficiency. Organizations take decisions that align with their specific storage, security, and efficiency requirements by considering the evaluation criteria for enterprise HCI solutions. By considering these factors, organizations can make informed decisions and choose a vendor with a strong foundation of reliability, stability, and long-term commitment, ensuring the durability of their HCI infrastructure and minimizing risks associated with vendor instability.

Read More
Application Infrastructure, IT Systems Management

Implementation of IaaS Container Security for Confidentiality and Integrity

Article | May 8, 2023

Containers have emerged as a choice for deploying and scaling applications, owing to their lightweight, isolated, and portable nature. However, the absence of robust security measures may expose containers to diverse threats, thereby compromising the confidentiality and integrity of data and apps. Contents 1 Introduction 2 IaaS Container Security Techniques 2.1 Container Image Security 2.2 Host Security 2.3 Network Security 2.4 Data Security 2.5 Identity and Access Management (IAM) 2.6 Runtime Container Security 2.7 Compliance and Auditing 3 Conclusion 1. Introduction Infrastructure as a Service has become an increasingly popular way of deploying and managing applications, and containerization has emerged as a leading technology for packaging and deploying these applications. Containers are software packages that include all the necessary components to operate in any environment. While containers offer numerous benefits, such as portability, scalability, and speed, they also introduce new security challenges that must be addressed. Implementing adequate IaaS container security requires a comprehensive approach encompassing multiple layers and techniques. This blog explores the critical components of IaaS container security. It provides an overview of the techniques and best practices for implementing security measures that ensure the confidentiality and integrity of containerized applications. By following these, organizations can leverage the benefits of IaaS and containerization while mitigating the security risks that come along. 2. IaaS Container Security Techniques The increasing IAAS security risks and security issues associated with IAAS these days are leading to a massive data breach. Thus, IAAS security concerns are taken into consideration, and seven best techniques are drafted below. 2.1. Container Image Security: Container images are the building blocks of containerized applications. Ensuring the security of these images is essential to prevent security threats. The following measures are used for container image security: Using secure registries: The registry is the location where container images are stored and distributed. Usage of centrally managed registries on campus, the International Organization for Standardization (ISO) can scan them for security issues and system managers may simply assess package gaps, etc. Signing images: Container images can be signed using digital signatures to ensure their authenticity. Signed images can be verified before being deployed to ensure they have not been tampered with. Scanning images: Although standard AppSec tools such as Software Composition Analysis (SCA) can check container images for vulnerabilities in software packages and dependencies, extra dependencies can be introduced during the development process or even at runtime. 2.2. Host Security: Host security is a collection of capabilities that provide a framework for implementing a variety of security solutions on hosts to prevent attacks. The underlying host infrastructure where containers are deployed must be secured. The following measures are used for host security: Using secure operating systems: The host operating system must be safe and up-to-date with the latest high severity security patches within 7 days of release, and others, within 30 days to prevent vulnerabilities and security issues. Applying security patches: Security patches must be applied to the host operating system and other software packages to fix vulnerabilities and prevent security threats. Hardening the host environment: The host environment must be hardened by disabling unnecessary services, limiting access to the host, and applying security policies to prevent unauthorized access. 2.3. Network Security: Network security involves securing the network traffic between containers and the outside world. The following measures are used for network security: Using Microsegmentation and firewalls: Microsegmentation tools with next-gen firewalls provide container network security. Microsegmentation software leverages network virtualization to build extremely granular security zones in data centers and cloud applications to isolate and safeguard each workload. Encryption: Encryption can protect network traffic and prevent eavesdropping and interception of data. Access control measures: Access control measures can restrict access to containerized applications based on user roles and responsibilities. 2.4. Data Security: Data stored in containers must be secured to ensure its confidentiality and integrity. The following measures are used for data security: Using encryption: Data stored in containers can be encrypted, using Transport Layer Security protocol version 1.1. (TLS 1.1) or higher, to protect it from unauthorized access and prevent data leaks. All outbound traffic from private cloud should be encrypted at the transport layer. Access control measures: Access control measures can restrict access to sensitive data in containers based on user roles and responsibilities. Not storing sensitive data in clear text: Sensitive data must not be stored in clear text within containers to prevent unauthorized access and data breaches. Backup app data, atleast weekly. 2.5. Identity and Access Management (IAM): IAM involves managing access to the container infrastructure and resources based on the roles and responsibilities of the users. The following measures are used for IAM: Implementing identity and access management solutions: IAM solutions can manage user identities, assign user roles and responsibilities, authenticate and provide access control policies. Multi-factor authentication: Multi-factor authentication can add an extra layer of security to the login process. Auditing capabilities: Auditing capabilities can monitor user activity and detect potential security threats. 2.6. Runtime Container Security: To keep its containers safe, businesses should employ a defense-in-depth strategy, as part of runtime protection. Malicious processes, files, and network activity that deviates from a baseline can be detected and blocked via runtime container security. Container runtime protection can give an extra layer of defense against malicious code on top of the network security provided by containerized next-generation firewalls. In addition, HTTP layer 7 based threats like the OWASP Top 10, denial of service (DoS), and bots can be prevented with embedded web application and API security. 2.7. Compliance and Auditing: Compliance and auditing ensure that the container infrastructure complies with relevant regulatory and industry standards. The following measures are used for compliance and auditing: Monitoring and auditing capabilities: Monitoring and auditing capabilities can detect and report cloud security incidents and violations. Compliance frameworks: Compliance frameworks can be used to ensure that the container infrastructure complies with relevant regulatory and industry standards, such as HIPAA, PCI DSS, and GDPR. Enabling data access logs on AWS S3 buckets containing high-risk Confidential Data is one such example. 3. Conclusion IaaS container security is critical for organizations that rely on containerization technology for deploying and managing their applications. There is likely to be an increased focus on the increased use of AI and ML to detect and respond to security incidents in real-time, the adoption of more advanced encryption techniques to protect data, and the integration of security measures into the entire application development lifecycle. In order to stay ahead of the challenges and ensure the continued security of containerized applications, the ongoing process of IaaS container security requires continuous attention and improvement. By prioritizing security and implementing effective measures, organizations can confidently leverage the benefits of containerization while maintaining the confidentiality and integrity of their applications and data.

Read More

Spotlight

Zensoft Services

We are an independent software testing and test automation services company.Excellence, enthusiasm and passion to envision smart software for a smarter world through disruptive, resilient and insightful testing and test automation solutions is what describes us best.

Related News

Application Infrastructure

dxFeed Launches Market Data IaaS Project for Tradu, Assumes Infrastructure and Data Provision Responsibilities

PR Newswire | January 25, 2024

dxFeed, a global leader in data solutions and index management for the financial industry, announces the launch of an Infrastructure as a Service (IaaS) project for Tradu, an advanced multi-asset trading platform catering to active traders and investors. In this venture, dxFeed manages the crucial aspects of infrastructure and data provision for Tradu. As an award-winning IaaS provider (the Best Infrastructure Provider by the Sell-Side Technology Awards 2023), dxFeed is poised to address all technical challenges related to market data delivery to hundreds of thousands of end users, allowing Tradu to focus on its core business objectives. Users worldwide can seamlessly connect to Tradu's platform, receiving authorization tokens for access to high-quality market data from the EU, US, Hong Kong, and Australian Exchanges. This approach eliminates the complexities and bottlenecks associated with building, maintaining, and scaling the infrastructure required for such extensive global data access. dxFeed's scalable low latency infrastructure ensures the delivery of consolidated and top-notch market data from diverse sources to the clients located in Asia, Americas and Europe. With the ability to rapidly reconfigure and accommodate the growing performance demands, dxFeed is equipped to serve hundreds of thousands of concurrent clients, with the potential to scale the solution even further in order to meet the constantly growing demand, at the same time providing a seamless and reliable experience. One of the highlights of this collaboration is the introduction of brand-new data feed services exclusively for Tradu's Stocks platform. This proprietary solution enhances Tradu's offerings and demonstrates dxFeed's commitment to delivering tailored and innovative solutions. Tradu also benefits from dxFeed's Stocks Radar—a comprehensive technical and fundamental market analysis solution. This Software as a Service (SaaS) seamlessly integrates with infrastructure, offering added value to traders and investors by simplifying complex analytical tasks. Moreover, Tradu leverages the advantages of dxFeed's composite feed (the winner at The Technical Analyst Awards). This accolade reinforces dxFeed's commitment to delivering excellence in data provision, further solidifying Tradu's position as a global leader in online foreign exchange. "When we were thinking of our new sophisticated multi-asset trading platform for the active trader and investors we met with the necessity of expanding instrument and user numbers. We realized we needed a highly competent, professional team to deploy the infrastructure, taking into account the peculiarities of our processes and services," said Brendan Callan, CEO of Tradu. "On the one hand, it allows our clients to receive quality consolidating data from multiple sources. On the other hand, as a leading global provider of online foreign exchange, we can dispose of dxFeed's geo-scalable infrastructure and perform rapid reconfiguration to meet growing performance demands to provide data to hundreds of thousands of our clients around the globe." "The range of businesses finding the Market Data IaaS (Infrastructure as a Service) model appealing continues to expand. This approach is gaining traction among various enterprises, from agile startups seeking rapid development to established, prominent brands acknowledging the strategic benefits of delegating market data infrastructure to specialized firms," said Oleg Solodukhin, CEO of dxFeed. By taking on the responsibilities of infrastructure and data provision, dxFeed empowers Tradu to focus on innovation and client satisfaction, setting the stage for a transformative journey in the dynamic world of financial trading. About dxFeed dxFeed is a leading market data and services provider and calculation agent for the capital markets industry. According to the WatersTechnology 2022 IMD & IRD awards honors, it's the "Most Innovative Market Data Project." dxFeed focuses primarily on delivering financial information and services to buy- and sell-side institutions in global markets, both traditional and crypto. That includes brokerages, prop traders, exchanges, individuals (traders, quants, and portfolio managers), and academia (educational institutions and researchers). Follow us on Twitter, Facebook, and LinkedIn. Contact dxFeed: pr@dxfeed.com About Tradu Tradu is headquartered in London with offices around the world. The global Tradu team speaks more than two dozen languages and prides itself on its responsive and helpful client support. Stratos also operates FXCM, an FX and CFD platform founded in 1999. Stratos will continue to offer FXCM services alongside Tradu's multi-asset platform.

Read More

IT Systems Management

ICANN ANNOUNCES GRANT PROGRAM TO SPUR INNOVATION

PR Newswire | January 16, 2024

The Internet Corporation for Assigned Names and Numbers (ICANN), the nonprofit organization that coordinates the Domain Name System (DNS), announced today the ICANN Grant Program, which will make millions of dollars in funding available to develop projects that support the growth of a single, open and globally interoperable Internet. ICANN is opening an application cycle for the first $10 million in grants in March 2024. Internet connectivity continues to increase worldwide, particularly in developing countries. According to the International Telecommunication Union (ITU), an estimated 5.3 billion of the world's population use the Internet as of 2022, a growth rate of 6.1% over 2021. The Grant Program will support this next phase of global Internet growth by fostering an inclusive and transparent approach to developing stable, secure Internet infrastructure solutions that support the Internet's unique identifier systems. "With the rapid evolution of emerging technologies, businesses and security models, it is critical that the Internet's unique identifier systems continue to evolve," said Sally Costerton, Interim President and CEO, ICANN. "The ICANN Grant Program offers a new avenue to further those efforts by investing in projects that are committed to and support ICANN's vision of a single, open and globally interoperable Internet that fosters inclusion amongst a broad, global community of users." ICANN expects to begin accepting grant applications on 25 March 2024. The application window will remain open until 24 May 2024. A complete list of eligibility criteria can be found at: https://icann.org/grant-program. Once the application window closes, all applications are subject to admissibility and eligibility checks. An Independent Application Assessment Panel will review admissible and eligible applications and the tentative timeline to announce the grantees of the first cycle is in January of 2025. Potential applicants will have several opportunities to learn more about the Call for Proposals and ask ICANN Grant Program staff members questions through question-and-answer webinar sessions in the coming months. For more information on the program, including eligibility and submission requirements, the ICANN Grant Program Applicant Guide is available at https://icann.org/grant-program. About ICANN ICANN's mission is to help ensure a stable, secured and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world.

Read More

Application Infrastructure

dxFeed Launches Market Data IaaS Project for Tradu, Assumes Infrastructure and Data Provision Responsibilities

PR Newswire | January 25, 2024

dxFeed, a global leader in data solutions and index management for the financial industry, announces the launch of an Infrastructure as a Service (IaaS) project for Tradu, an advanced multi-asset trading platform catering to active traders and investors. In this venture, dxFeed manages the crucial aspects of infrastructure and data provision for Tradu. As an award-winning IaaS provider (the Best Infrastructure Provider by the Sell-Side Technology Awards 2023), dxFeed is poised to address all technical challenges related to market data delivery to hundreds of thousands of end users, allowing Tradu to focus on its core business objectives. Users worldwide can seamlessly connect to Tradu's platform, receiving authorization tokens for access to high-quality market data from the EU, US, Hong Kong, and Australian Exchanges. This approach eliminates the complexities and bottlenecks associated with building, maintaining, and scaling the infrastructure required for such extensive global data access. dxFeed's scalable low latency infrastructure ensures the delivery of consolidated and top-notch market data from diverse sources to the clients located in Asia, Americas and Europe. With the ability to rapidly reconfigure and accommodate the growing performance demands, dxFeed is equipped to serve hundreds of thousands of concurrent clients, with the potential to scale the solution even further in order to meet the constantly growing demand, at the same time providing a seamless and reliable experience. One of the highlights of this collaboration is the introduction of brand-new data feed services exclusively for Tradu's Stocks platform. This proprietary solution enhances Tradu's offerings and demonstrates dxFeed's commitment to delivering tailored and innovative solutions. Tradu also benefits from dxFeed's Stocks Radar—a comprehensive technical and fundamental market analysis solution. This Software as a Service (SaaS) seamlessly integrates with infrastructure, offering added value to traders and investors by simplifying complex analytical tasks. Moreover, Tradu leverages the advantages of dxFeed's composite feed (the winner at The Technical Analyst Awards). This accolade reinforces dxFeed's commitment to delivering excellence in data provision, further solidifying Tradu's position as a global leader in online foreign exchange. "When we were thinking of our new sophisticated multi-asset trading platform for the active trader and investors we met with the necessity of expanding instrument and user numbers. We realized we needed a highly competent, professional team to deploy the infrastructure, taking into account the peculiarities of our processes and services," said Brendan Callan, CEO of Tradu. "On the one hand, it allows our clients to receive quality consolidating data from multiple sources. On the other hand, as a leading global provider of online foreign exchange, we can dispose of dxFeed's geo-scalable infrastructure and perform rapid reconfiguration to meet growing performance demands to provide data to hundreds of thousands of our clients around the globe." "The range of businesses finding the Market Data IaaS (Infrastructure as a Service) model appealing continues to expand. This approach is gaining traction among various enterprises, from agile startups seeking rapid development to established, prominent brands acknowledging the strategic benefits of delegating market data infrastructure to specialized firms," said Oleg Solodukhin, CEO of dxFeed. By taking on the responsibilities of infrastructure and data provision, dxFeed empowers Tradu to focus on innovation and client satisfaction, setting the stage for a transformative journey in the dynamic world of financial trading. About dxFeed dxFeed is a leading market data and services provider and calculation agent for the capital markets industry. According to the WatersTechnology 2022 IMD & IRD awards honors, it's the "Most Innovative Market Data Project." dxFeed focuses primarily on delivering financial information and services to buy- and sell-side institutions in global markets, both traditional and crypto. That includes brokerages, prop traders, exchanges, individuals (traders, quants, and portfolio managers), and academia (educational institutions and researchers). Follow us on Twitter, Facebook, and LinkedIn. Contact dxFeed: pr@dxfeed.com About Tradu Tradu is headquartered in London with offices around the world. The global Tradu team speaks more than two dozen languages and prides itself on its responsive and helpful client support. Stratos also operates FXCM, an FX and CFD platform founded in 1999. Stratos will continue to offer FXCM services alongside Tradu's multi-asset platform.

Read More

IT Systems Management

ICANN ANNOUNCES GRANT PROGRAM TO SPUR INNOVATION

PR Newswire | January 16, 2024

The Internet Corporation for Assigned Names and Numbers (ICANN), the nonprofit organization that coordinates the Domain Name System (DNS), announced today the ICANN Grant Program, which will make millions of dollars in funding available to develop projects that support the growth of a single, open and globally interoperable Internet. ICANN is opening an application cycle for the first $10 million in grants in March 2024. Internet connectivity continues to increase worldwide, particularly in developing countries. According to the International Telecommunication Union (ITU), an estimated 5.3 billion of the world's population use the Internet as of 2022, a growth rate of 6.1% over 2021. The Grant Program will support this next phase of global Internet growth by fostering an inclusive and transparent approach to developing stable, secure Internet infrastructure solutions that support the Internet's unique identifier systems. "With the rapid evolution of emerging technologies, businesses and security models, it is critical that the Internet's unique identifier systems continue to evolve," said Sally Costerton, Interim President and CEO, ICANN. "The ICANN Grant Program offers a new avenue to further those efforts by investing in projects that are committed to and support ICANN's vision of a single, open and globally interoperable Internet that fosters inclusion amongst a broad, global community of users." ICANN expects to begin accepting grant applications on 25 March 2024. The application window will remain open until 24 May 2024. A complete list of eligibility criteria can be found at: https://icann.org/grant-program. Once the application window closes, all applications are subject to admissibility and eligibility checks. An Independent Application Assessment Panel will review admissible and eligible applications and the tentative timeline to announce the grantees of the first cycle is in January of 2025. Potential applicants will have several opportunities to learn more about the Call for Proposals and ask ICANN Grant Program staff members questions through question-and-answer webinar sessions in the coming months. For more information on the program, including eligibility and submission requirements, the ICANN Grant Program Applicant Guide is available at https://icann.org/grant-program. About ICANN ICANN's mission is to help ensure a stable, secured and unified global Internet. To reach another person on the Internet, you need to type an address – a name or a number – into your computer or other device. That address must be unique so computers know where to find each other. ICANN helps coordinate and support these unique identifiers across the world.

Read More

Events