Hi [[ session.user.profile.firstName ]]

Intel Network Builders

  • Date
  • Rating
  • Views
  • Cloud-First Networking from Big Switch for the Hybrid Cloud Era
    Cloud-First Networking from Big Switch for the Hybrid Cloud Era [Big Switch] Prashant Gandhi, VP & Chief Product Officer & Bala Ramachandran, Director of Product Management Recorded: Sep 18 2018 58 mins
    IT Organizations continue to face challenges due to silo'ed approach to hybrid cloud. Current on-prem data centers have completely different style of networking and governance processes compared to networking in public cloud. With silo'ed teams managing these disparate environments, there are greater complexity and constraints in application deployment, higher costs, and longer deployment cycles.

    Big Switch Networks has pioneered a Cloud-First approach which completely re-imagines hybrid cloud networking to enable consistency and control across on-prem and any public cloud (AWS, Azure or GCP). It brings public cloud’s virtual private cloud (VPC) based logical networking construct for on-prem networking (enterprise cloud networking) to deliver network automation and visibility for enterprise workloads. In addition, by extending control, governance and visibility to public cloud VPCs, IT organizations can finally bring their hybrid cloud vision into reality.

    In this webinar we will discuss:

    1)How Big Cloud Fabric implements VPC construct for network automation and visibility in on-prem (enterprise) cloud.
    2)How Big Monitoring Fabric achieves end-to-end visibility and security for applications deployed both on-prem and in public cloud VPCs.
    3)How Multi-Cloud Director enables unified hybrid cloud management across on-prem and multiple public clouds.
  • Unleashing the Power of Big Data Network Analytics to Improve User Productivity
    Unleashing the Power of Big Data Network Analytics to Improve User Productivity Anand Srinivas, Co-Founder and CTO, Nyansa Recorded: Sep 4 2018 43 mins
    Advances in high-performance computing from Intel, coupled with emerging machine learning technologies, have opened the door to a new era of cloud-based network analytics solutions.
    Armed with techies new technologies, enterprises and service providers are now able to solve critical user performance issues across increasingly complex access networks Until now, with conventional technology, this has simply been possible to achieve. From client Wi-Fi access to wired network services, user application performance to the utilization of wide area network links, innovative full-stack network analytics eliminates the costly and cumbersome manual analysis and correlation of volumes of data running on today’s corporate networks.
  • OPNFV Overview: Navigating Its Many Projects
    OPNFV Overview: Navigating Its Many Projects Amar Kapadia, NFV specialist and co-founder, Aarna Networks, Inc. Recorded: Aug 29 2018 55 mins
    Open source networking projects are transforming how service providers and enterprises develop, deploy, and scale their networks and next-generation services. Is your organization embarking on an NFV transformation journey? Do you believe open source software will play a critical role in this journey? Are you unclear how to integrate and test large, complex open source projects for your NFV use case? If yes, this webinar is for you.

    This webinar provides an overview of The Linux Foundation OPNFV project (Open Platform for NFV), the many projects that constitute OPNFV and key PoC demos developed by the OPNFV community. In this webinar that also includes an OPNFV Yardstick demo, you will learn:

    * What is OPNFV?
    * Why is OPNFV needed?
    * What are the core sub-projects and initiatives within OPNFV?
    * What are the key PoC demos developed by the community?
    * How do I get involved?
  • DPI: The key technology for vEPC Solutions - Build or Buy?
    DPI: The key technology for vEPC Solutions - Build or Buy? Alexander Mueller, Product Manager DPI, Ipoque, Rhode & Schwarz Cybersecurity Recorded: Aug 21 2018 53 mins
    When your virtual Evolved Packet Core (vEPC) solution needs deep packet inspection (DPI) as a key enabling feature, highly reliable and accurate real-time identification of network traffic and applications is an important requirement.

    Whether it is for analytics, policy enforcement, tiered pricing, web and video optimization, content filtering, parental control or security services, DPI is a crucial technology to implement virtualized network equipment solutions.

    vEPC vendors looking at the business case can decide to build DPI software in-house, use open source solutions or to license software from a DPI specialist. Within this webinar, we will do a deep dive explaining the different sourcing options and the respective evaluation criteria, which should be considered.

    The real-life vendor scenario of a vEPC vendor will be used to illustrate the different aspects of a realistic use case.

    By the end of this session, attendees will have learned:

    •How DPI has become a crucial technology for vEPC solutions
    •How the scope of needed know-how has changed for vEPC vendors
    •What the benefits of DPI for vEPC use cases are
    •What the sourcing options for DPI solutions are
    •How to evaluate and answer the important aspects of the build or buy DPI decision
  • Automation and Distributed Computing
    Automation and Distributed Computing Chris Simon, Director of the Service Provider and NFV Business Unit, Dorado Software Recorded: Aug 7 2018 45 mins
    Innovation driven by cloud, NFV, IOT, video content and virtual reality is compelling the delivery of increasingly distributed computing options. These environments will need to support technical requirements such as latency, connectivity and power management while adhering to regulator factors such as HIPPA data security. Distributed computing will require a number of infrastructure form factors such as HCI, private cloud and embedded computing paired with a myriad of operational environments process such Nutanix, Azure and OpenStack. All these are delivered in diverse partnerships and business models.

    In this presentation, we will discuss automation opportunities that allow all stakeholders to effectively deploy and monitor the underlying infrastructure while orchestrating and managing individual functions that make up the distributed computing services - all with minimal and often remote support staff.
  • Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions
    Getting to the Edge – Exploring 4G/5G Cloud-RAN Deployable Solutions Prakash Siva - Vice President, Technology & Strategy and Natasha Tamaskar – Vice President, Global Marketing / Sales Strategy Recorded: Jul 31 2018 49 mins
    At a time when the telecommunications industry is in significant transition, Communication Service Providers (CSPs) and equipment manufacturers are turning to open source and multi-access edge computing (MEC) solutions.

    These solutions are required to meet key infrastructure constraints such as cost efficiencies, deployment flexibility and deliver mission- critical services with high quality. Intel® with their Network Edge Virtualization (NEV) and FlexRAN initiatives is at the forefront of providing cutting edge platform and framework to build these solutions. These enable CSPs to accelerate and innovate their 4G/5G cloud RAN initiatives and ensure better user experience by moving compute intensive, latency-sensitive applications to the network edge.

    Radisys is committed to ensuring that open telecom initiatives are not ‘science projects’ – but actual, deployable solutions that can be commercialized with faster time-to-market.

    This webinar will focus on:

    • Key considerations required for rapid integration and deployment of mobile edge services using Intel-based Mobile Edge Compute (MEC) infrastructure
    • Key considerations required for 4G and 5G Cloud-RAN implementations using Intel’s FlexRAN development framework
    • The role and purpose of multiple open initiatives such as: xRAN, TIP, ONAP, ONF in evolving the technology stack of service providers along with associated integration requirements and challenges

    This webinar is best suited for technology innovation groups and product managers at service providers, system integrators and telecom equipment manufacturers.
  • DPDK 18.05 New Features
    DPDK 18.05 New Features Tim O’Driscoll, Software Product Marketing for DPDK, Intel Recorded: Jul 25 2018 45 mins
    This webinar will describe the new features introduced in the most recent DPDK release, 18.05. It will also describe some of the features planned for the next release, 18.08, which is due in August.

    Key features included in the 18.05 release include: changes to the memory subsystem to allow dynamic allocation of memory, creation of a new API to support hardware and software acceleration of compression, extension of the vhost-user library to support a hardware accelerated data path, support for crypto operations via virtio, and the addition of port representors which provide a generic framework for virtual function management in DPDK.
  • What's new in ONAP Beijing Release?
    What's new in ONAP Beijing Release? Amar Kapadia, Co-founder Aarna Networks, Inc. Recorded: Jul 24 2018 45 mins
    Are you worried about orchestrating your NFV/SDN network services and edge computing applications? The Linux Foundation Open Network Automation Platform (ONAP) promised to be a key component of next generation networks to orchestrate, configure, monitor and automatically manage complex services and applications. With the recent Beijing release, the ONAP community has fortified software stability, harmonized northbound APIs with standard bodies, improved ONAP deployment using Kubernetes, added important functional features and created two new projects. If you have not followed the release too closely, join us for this webinar and learn all about it. In this webinar, you will learn:
    •What is ONAP?
    •How can ONAP help you?
    •What is new in the Beijing release?
    •How can you get involved?
  • A pragmatic approach to service assurance in 5G network slicing
    A pragmatic approach to service assurance in 5G network slicing Anton Basil, Vice President – Technology, Veryx Technologies Recorded: Jul 17 2018 42 mins
    Many leading network operators as well as network equipment manufacturers have already recognized network slicing as an ideal network architecture for 5G deployment. It provides the flexibility for network operators to slice one physical network into dedicated virtual networks, logically separated from one another and dedicated for different types of services, with different characteristics and requirements.
  • It takes Deep Learning to Harness the Internet!
    It takes Deep Learning to Harness the Internet! Wes Jensen, CEO & Co-Founder (Netrolix) Recorded: Jul 12 2018 49 mins
    Netrolix leverages artificial intelligence to analyze network data to improve throughput by making more intelligent routing decisions. AI-WAN combines Netrolix Software Defined Gateways (SDG) with the company’s Machine Learning controller technology that provides deep analysis of network routes to identify the least congested and fastest data path through the network.

    The Software Defined Gateway (SDG) is a multifunction network appliance that can be deployed as a router, switch, firewall, or SD-WAN appliance.

    This provides full SD-WAN capabilities with intelligent switching of data across IP, multiprotocol label switching (MPLS), virtual private LAN service (VPLS), and virtual private network (VPN) connections, or it can be deployed as a termination point for carrier services.

    The Machine Learning controller platform analyzes real-time and historical information on network performance including data center locations, service provider tendencies, current congestion issues, time of day, and historical traffic patterns.

    Lastly, the Security Shield enhances these capabilities through the creation of unique security profiles for each device, location, and network in an enterprise. The Machine Learning technology analyzes data from these devices to spot traffic anomalies that are consistent with malware or network attacks.

Embed in website or blog