Reducing resourcing challenges by out-tasking multi-vendor network infrastructure projects
In today’s increasingly complex multi-vendor network environments, many businesses are compelled to out-task their multi-vendor operations to a single provider of specialized network services. Ciena’s Atura Bavisi details the qualities needed when looking for the right multi-vendor services partner.
By Atura Bavisi – Businesses today are constantly changing, often in unique and different ways due to market-specific conditions, but they all share something in common: a complex network environment. Operators are always looking for ways to optimize their network, at once reducing complexity while adding flexibility to handle the rapidly growing traffic demands.
These conditions often create a need for multi-vendor networks. If a business would like to reduce its OPEX and at the same time improve network performance without significantly increasing their IT resources, then buying network equipment from multiple vendors and leveraging vendor-specific services to implement and maintain this disparate equipment become critical.
However, multi-vendor projects come with their own set of challenges. For example, the multi-vendor approach often reduces visibility across the network, making it difficult to plan effectively or to provision resources to support new services rapidly. What’s more, the cost of working with multiple suppliers and in-house service teams to design and deploy solutions can be prohibitive and a logistical challenge, as well as requiring multiple custom interfaces.
Very often, corporations don’t have the ability to recruit the right highly specialized personnel to meet all these technical requirements stemming from a multi-vendor network, and most vendors only focus on their own products and solutions. more>
Posted in Broadband, Communication industry, Economic development, Economy, Education, How to, Net, Product, Science, Technology, Telecom industry
Tagged Business improvement, Ciena, Fiber optics, Internet, Productivity, Technology
New technology in industry is creating a platform economy
By Frank_Fang – Twenty years ago, product-centric companies dominated a list of the most valuable companies in the world. The list was a Who’s Who of automotive, manufacturing, oil and gas, and brick-and-mortar retailers.
Today, platform-based businesses rule.
This new economy forces product-centric manufacturing companies to rethink how they transform digitally to survive and thrive in a data-rich market. It’s no secret that new technology and new approaches eventually supersede the old.
We’re witnessing one of these periods now. As manufacturers look for ways to radically redefine processes through the hype of the sharing economy, online platforms, the end of money and all the other buzzwords people use today, digital twin evolution will lead to platform economy, a state Viktor Mayer-Schönberger foresees in his book Reinventing Capitalism in the Age of Big Data.
Digital twins, which evolve from decades of simulation and analysis in engineering, are high fidelity models for actual physical objects such as a product or production process. Using computer aided-design, model-based system engineering and multiphysics simulation tools, a designer or engineer creates a digital representation for a physical object or process.
The digital twin is no longer science fiction. For example, NASA used this approach to design, engineer and produce two Mars rovers: Curiosity and InSight.
Since you can’t build a Mars environment on earth, you simply bring Mars to the computer and digitally test your Mars rover. more>
Posted in Book review, Broadband, Business, Economic development, Economy, Education, Energy & emissions, How to, Net, Product, Science, Technology, Transportation
Tagged Business improvement, Electronics, Manufacturing, PLM, Product lifecycle management, Productivity, Siemens, Technology
Signals from Distant Lightning Could Help Secure Electric Substations
By John Toon – Side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure, a new study suggests.
By analyzing electromagnetic signals emitted by substation components using an independent monitoring system, security personnel could tell if switches and transformers were being tampered with in remote equipment. Background lightning signals from thousands of miles away would authenticate those signals, preventing malicious actors from injecting fake monitoring information into the system.
The research, done by engineers at the Georgia Institute of Technology, has been tested at substations with two different electric utilities, and by extensive modeling and simulation. Known as radio frequency-based distributed intrusion detection system (RFDIDS), the technique was described February 26 at the 2019 Network and Distributed System Security Symposium (NDSS) in San Diego.
“We should be able to remotely detect any attack that is modifying the magnetic field around substation components,” said Raheem Beyah, Motorola Foundation Professor in Georgia Tech’s School of Electrical and Computer Engineering and co-founder of Fortiphyd Logic, Inc. “We are using a physical phenomenon to determine whether a certain action at a substation has occurred or not.”
Opening substation breakers to cause a blackout is one potential power grid attack, and in December 2015, that technique was used to shut off power to 230,000 persons in the Ukraine. Attackers opened breakers in 30 substations and hacked into monitoring systems to convince power grid operators that the grid was operating normally. Topping that off, they also attacked call centers to prevent customers from telling operators what was happening. more>
- Ultra-Low Power Chips Help Make Small Robots More Capable, John Toon
- Researchers Use Machine Learning To More Quickly Analyze Key Capacitor Materials, Josh Brown
- New Grant Award Supports Research on Early Detection of Ovarian Cancer, Elizabeth Thomson
- When Sand-Slithering Snakes Behave Like Light Waves, John Toon
- Urine Test Detects Organ Transplant Rejection, Could Replace Needle Biopsies, Ben Brumfield
- New Grant Award Supports Research on Early Detection of Ovarian Cancer, Elizabeth Thomson
- Novel App Uses AI to Guide, Support Cancer Patients, Elizabeth Thomson
- Mending a Broken Heart, Ben Brumfield
- Snaring Bacteria in DNA-based Nets the Way White Blood Cells Do, Kylie Urban and Ben Brumfield
- Researchers Chart Path to Cheaper Flexible Solar Cells, Josh Brown
- Will Moving to the Commercial Cloud Leave Some Data Users Behind? John Toon
- $25 Million Award Will Support Nuclear Nonproliferation R&D, Education, John Toon
- FDA Taps Georgia Tech to Help Reduce Cost of Making Antibiotics, Josh Brown
Posted in Business, Economic development, Economy, Education, Healthcare, How to, Nature, Net, Science, Technology
Tagged Business improvement, Earth, Electronics, Georgia Tech, Health, Skills, Technology
Following the 3-pillar approach to effective security strategy
Large-scale data breaches are reported in the press almost daily, with devastating consequences for the organizations and individuals involved. A multi-layer security strategy minimizes cybersecurity risks for your organization and streamlines the compliance journey in the run-up to upcoming legislation.
By Paulina Gomez – Technology innovation – the continued evolution of cloud computing, the rapid increase in Internet of Things (IoT) and the growth of Artificial Intelligence (AI) – is expected to drive a 100x increase in connected devices and a 1,000x increase in data traffic by 2020 (2016 Mobility Report, November 2016, Ericsson). Each new device doesn’t just drive traffic, it also dramatically expands the network attack surface – increasing the opportunity of cybercriminals to leverage sophisticated methods to exploit these opportunities.
In response to the rapidly evolving cybersecurity threat landscape, regulations around the world are upping the pressure on organizations to protect their sensitive customer and operational data. The maximum fine for a data breach in the upcoming European General Data Protection Regulation (GDPR), for example, could be up to 4% of global revenues; enough to put even large organizations out of business.
How can an organization minimize its security risks? It’s about more than just encryption and firewalls. A comprehensive, multi-layer security strategy is vital to an effective defense.
By following these three key pillars to achieve the confidentiality, integrity, and availability of data in your network, you will be protecting your data, your customers, and your business. more>
Posted in Broadband, Business, Communication industry, Economic development, Economy, Education, How to, Net, Product, Science, Technology
Tagged Broadband, Business improvement, Ciena, Cybersecurity, Fiber optics, Internet, Technology
By Stephane Kasriel – No matter where you look, so much rapid change is happening that even how companies manage their talent strategy is shifting. Gone are the days of HR managing workforce planning with an Excel spreadsheet. To remain not only competitive but relevant, more companies are turning to detailed workforce plans, and younger generations of managers are much more likely to be putting these plans in place. As they do, and as they ascend to more senior roles, they’re reshaping the future of work.
More than half of younger generation managers polled see future workforce planning as a “top priority” for their departments–nearly three times more than their baby boomer counterparts, according to my company Upwork’s 2019 Future Workforce Report.
Whereas baby boomers are known for keeping their employees close, millennials, who now make up more than half the U.S. workforce, overwhelmingly desire “flexible and fluid” work settings.
Younger generation managers are also more likely to see it as an individual’s right to work remotely. After all, they’ve grown up in the digital era. They do not understand why someone should be tethered to a desk nine-to-five if modern technology frees them to work anytime, anywhere, and from any connected device.
In fact, many believe they are more productive working remotely than they would be in rigid office environments with all of their distractions. more>
Posted in Broadband, Business, Economic development, Economy, Education, How to, Leadership, Net, Science, Technology
Tagged Broadband, Business improvement, Future, Internet, Jobs, Leadership, Work