Super Blueprints Integrate the 5G Open Source Stack from Core to Door

ARPIT JOSHIPURA | June 1, 2021

There is an exciting convergence in the networking industry around open source, and the energy is palpable. At LF Networking, we have a unique perspective as the largest open source initiative in the networking space with the broadest set of projects that make up the diverse and evolving open source networking stack. LF Networking provides platforms and building blocks across the networking industry that enable rapid interoperability, deployment, and adoption and is the nexus for 5G innovation and integration.

LF Networking has now tapped confluence on industry efforts to structure a new initiative to develop 5G Super Blueprints for the ecosystem. Major integrations between the building blocks are now underway–between ONAP and ORAN, Akraino and Magma, Anuket and Kubernetes, and more.

Spotlight

CyberHive Security

CyberHive Security is “Taking Security by Swarm” by enlisting the collaborative expertise of cybersecurity professionals, consultants, clients and vendors across the country. Businesses and organizations are under constant attack from various threats. Protecting sensitive and/or confidential data from hackers is critical for every organization. Our “colony” of specialists eliminate the burden of needing extensive IT knowledge and reduces the time-consuming tasks and costs associated with researching, comparing and selecting solutions, training, and latest next generation technology available to mitigate advanced threats.

OTHER ARTICLES

A new era of automation with Cisco ACI and the Citrix ADC Manager app

Article | February 12, 2020

Since it was first available, Citrix has worked with Cisco Application Centric Infrastructure (ACI) to integrate Citrix ADC with the Cisco Application Policy Infrastructure Controller (APIC). As a valued technology partner, Citrix has a device package — a software module — that enables users to configure the Citrix ADC directly from a Cisco APIC. This setup has run in many customer production environments over the years. Let’s consider one of those customers — Jim. He was the first to deploy the integrated solution in his data center. The solution gave him the automation he needed and a single view to configure, deploy, and manage applications. However, his application admins preferred to use the Citrix ADC user interface to manage L4-L7 services.

Read More

Storage made simple for hybrid multicloud: the new IBM FlashSystem family

Article | February 12, 2020

In part one of this blog post series, we discussed IBM’s approach for delivering innovation while simplifying your storage infrastructure, reducing complexity, and cutting costs. Now let’s take a closer look at the details of the new IBM FlashSystem family, a single platform designed to simplify your storage infrastructure, reduce complexity and cut costs, while continuing to deliver extensive innovation for your enterprise class storage solutions and your hybrid multicloud environments.

Read More

We Need to Talk About ‘Cloud Neutrality’

Article | February 10, 2020

We spent a lot of years talking about net neutrality the idea that the companies that provide access to the internet shouldn’t unfairly block, slow down, or otherwise interfere with traffic even if that traffic competes with their services. But there’s an even bigger issue brewing, and it’s time to start talking about it: cloud neutrality. “While its name sounds soft and fluffy,” Microsoft president and general counsel Brad Smith and coauthor Carol Ann Browne write in their recent book, Tools and Weapons: The Promise and the Peril of the Digital Age, “in truth the cloud is a fortress.” Their introduction describes the modern marvel of the data center: a 2 million-square-foot, climate-controlled facility made up of colossal electrical generators, diesel fuel tanks, battery arrays, and bulletproof doors

Read More

Why enterprises are going all-in on hyperscale

Article | February 10, 2020

Cloud computing continues to dominate the technology space, with cloud migration yielding a rain of opportunities and benefits. To date, achieving massive scale in computing power and data storage is a priority for organizations looking to mature in digital transformation. Hyperscale infrastructure is designed exclusively for that purpose, and it offers increasingly relevant features such as high levels of performance and high tolerance and room for error as well as redundancy. A recent report showed enterprises are leaning towards hyperscalers for cloud services as compared to second-tier providers.

Read More

Spotlight

CyberHive Security

CyberHive Security is “Taking Security by Swarm” by enlisting the collaborative expertise of cybersecurity professionals, consultants, clients and vendors across the country. Businesses and organizations are under constant attack from various threats. Protecting sensitive and/or confidential data from hackers is critical for every organization. Our “colony” of specialists eliminate the burden of needing extensive IT knowledge and reduces the time-consuming tasks and costs associated with researching, comparing and selecting solutions, training, and latest next generation technology available to mitigate advanced threats.

Events