Inside Living on the Edge episode eight, Jason and Dan discuss Continental’s new collision avoidance use case demo with Deutsche Telekom and Telefonica, VMware’s new CTO, network slicing, Neustar history and MailChimp’s exit to Intuit.
Links:
- Deutsche Telekom, Telefonica and MobiledgeX optimise user experience for Continental’s Collision Warning solution — The application backend was deployed in the cloudlets of Deutsche Telekom and Telefonica to serve each operator’s customers respectively. Both instances were interconnected based on a managed connection using the industry standardised IPX network (IP Exchange). This interconnection was configured to ensure low latency and reduced jitter, thereby preserving the edge service interconnection from congestion or traffic peaks.
- TELUS and Ericsson: How network slicing is changing the fundamentals of telecom — The TELUS 5G network can now support multiple virtual networks that run in parallel, seamlessly. This enables networks to support different kinds of services at the same time. In traditional 3G/4G networks, communication service providers (CSPs) use different Quality of Service (QoS) values or virtual private networks (VPNs) to differentiate service level of priority, for consumers, business and public safety services on one network. However, when congestion happens, it increases the likelihood of dropped calls and service interruption. When there is a site failure and during disaster recovery, the so-called “fail over” to an alternative site and restoration of services takes longer than expected, which is not acceptable for today’s customers who are used to having always on connectivity.
- Telefónica and NEC to build Open RAN live pilots in 4 global markets as a key milestone toward mass deployment — "...Telefónica and NEC will collaborate in validating and implementing cutting-edge Open RAN technologies and various use cases at the newly established Telefónica Technology and Automation Lab in Madrid. The use cases include those built on AI-driven Radio Intelligent Controllers (RIC) for RAN optimization, service lifecycle automation based on Service Management and Orchestration (SMO), testing and deployment automation in accordance with Telefónica’s Continuous Integration/ Continuous Deployment (CI/CD) framework, as well as power savings optimization."
- Swarmio: The bridge between the telco and game publisher — One solution, he says, is to deliver the much-needed last-mile connectivity that gives them the latency-sensitive connections they require. “They could be the bridge. They could go to these gaming publishers and build them a platform that could help them increase their average revenue per user (ARPU) by $5 a month on top of their existing revenues.”
- The edge is just a massive, geographically distributed cluster — The difficult thing, in the early days of hyperdistributed computing with varying levels of the tightness or looseness of the coupling in clusters of machines, is to bridge the gap for people who are still thinking about edge locations as pets and not as cattle. The underlying infrastructure has to be provisioned and managed in a consistent way, whether the machines are relatively tightly coupled, as is the case with HPC simulation and modeling clusters using the Message Passing Interface (MPI) stack or Partitioned Global Address Space (PGAS) to lash nodes together; or loosely couple – or they might not be coupled at all – a collection of Web servers in a datacenter, perhaps, or OpenRAN servers housed underneath cell base stations.
- Zero Trust Requires Cloud Data Security with Integrated Continuous Endpoint Risk Assessment — From an endpoint perspective, CCA enables your policies to take into account all the typical endpoint indicators such as malicious apps, compromised devices, phishing attacks, app and device vulnerabilities, and even risky apps. Our access platform then adds indicators of anomalous user behaviour such as large downloads, unusual access patterns and unusual locations. And our data loss prevention (DLP) capabilities enables us to assign sensitivity to what the user is attempting to do.
All of this telemetry can then be used to respond appropriately. We can restrict access to sensitive data, request step-up authentication, or take specific action on the content itself, such as masking or redacting certain keywords, applying encryption and adding watermarking. And in the event that what is occurring is a breach — we can shut down access altogether.