In this third webinar part of a series of ‘Winning with Fibre’, we will focus on the OSS/BSS transformation - especially on the delivery phase of it. While agile methods have been widely used in software development, it is still relatively new way of doing large telco transformation projects. POST Luxembourg, an innovative CSP from Europe, is in the middle of their transformation covering a vast amount of BSS and OSS systems. POST Luxembourg case provides is a great example of a transformation project which has successfully adopted agile ways of carrying out
the project in manageable increments.
Sign up now and get insights into the POST case!
This guest webcast features Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry who will be giving their Black Hat 2016 talk, analyzing the real risk of using OSS and the best way to manage its use within your organization.
Through real world examples and personal experience, the speakers will...
- Examine the current hype around OSS, highlighting what organizations should be the most concerned about, and how to evaluate the true cost of using OSS
- Explore how to utilize learnings from your incident response function to create smarter products and avoid maintenance costs of OSS
- Introduce a customized OSS Maturity Model and walk through the stages of organizational maturity with regards to how they prioritize and internalize the risk presented by OSS
Learn more about Jake Kouns:
Learn more about Christine Gadsby:
It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.
Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.
In this webinar you’ll learn how to:
-Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts
-Implement controls on OSS usage at your organization
-Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
Converging telecommunication networks - one comprehensive data model for OSS and IT automationRead more >
Konvergenz in Telekommunikationsnetzen – ein übergreifendes Datenmodell für OSS und IT Automatisierung
Die integrierte Verwaltung aller Netz- und Serviceressourcen in Telekommunikationsnetzen bildet die Basis einer modernen OSS/BSS Architektur. Die Konvergenz der Technologien führt aber gleichzeitig zu einem Verschmelzen von OSS und IT Themen. Weiterhin werden im Rahmen von Virtualisierungen in naher Zukunft verstärkt auch Aufgabenstellungen aus dem Netz in das Data Center verlagert. Die Herausforderung für die Netzbetreiber ist somit, Transparenz über alle Ressourcen der gesamten Service-Kette zu erhalten, d.h. von der physikalischen, über die logische bis zur Service Ebene und von Telekommunikation über IT bis Data Center. Diese Transparenz ist die Grundlage für alle Planungs- und Engineering, Service Fulfillment und Service Assurance Prozesse und bildet somit die Basis für jegliche Art der OSS und IT Automatisierung. Neben funktionaler Themen in den unterschiedlichen Bereichen steht also insbesondere die für einen effizienten Netzbetrieb zwingend erforderliche Durchgängigkeit im Vordergrund. Das übergreifende Datenmodell bildet die Basis für die „out of the box“ integrierten Lösungen von FNT Command, wodurch diese nahtlose Navigation zwischen den unterschiedlichen Layern und Bereichen ermöglicht wird.
In this dynamic webinar you’ll hear from Axel Clauberg, who is responsible for Deutsche Telekom's IP Architecture and Designs for fixed and mobile networks. Mr. Clauberg is an outspoken advocate for the standardization of real-time OSS, and will reveal critical information for Network Equipment Providers, Service Providers and Systems Integrators. This webinar will demonstrate the importance of leveraging IETF standards of NETCONF and YANG, which can provide enormous cost savings, innovation benefits and vendor flexibility for Service Providers.Read more >
Learn how to overcome the challenges of building Scalable Iot Apps with OSS Database Technologies.Read more >
For service providers migrating to SDN and NFV, operationalizing new, virtualized services in a hybrid environment requires modernizing the existing BSS/OSS environment and unifying cloud, resource and service orchestration. Without both, monetizing new applications and services is exceedingly difficult if not impossible. In this webinar, NEC/NetCracker will discuss the migration path to generating revenue from new, virtualized services and applications, highlighting practical recommendations for modernizing the BSS/OSS alongside essential orchestration solutions.Read more >
Join Incognito Software and TVC for this free one hour webinar as we discuss:
- How you can tackle the pressures brought on by increasing subscriber and device demands
- How a converged OSS solution can fulfill the end to end role needed to help you deliver and manage IP services
- How to enhance customer experience and deliver flexible, value-added services
Join Bitnami and AWS Marketplace for best practices in building and managing websites with open source software, and a look into the accelerating growth of the open source community.
At the conclusion of the webinar, attendees will be given the chance to launch OSS through AWS Marketplace and receive $25USD in AWS credits.
According to industry research, enterprise use of open source software (OSS) is on the rise. Development organizations in Enterprise and all sectors are examining the case for using open source software for applications within their own IT infrastructures as well as in the software they sell.
Bitnami-packaged applications have been downloaded over 2 million times and deployed by users around the world, ranging from consulting companies to governments, universities to non-profits, and Fortune 500 companies.
Open Source Software (OSS) on AWS can present the opportunity for efficiency and savings in developing applications. AWS Marketplace makes it easy to locate, procure, and include OSS in your development and testing organizations, making it easier to run your overall business.
This webinar features service assurance research content from Analysys Mason, and a tools consolidation case study on how Broadvox drove their IT and OSS transformation with unified service assurance from Monolith Software.Read more >
The popularity of Open Source Software (OSS) Technologies in the recent years has greatly impacted the development and innovation of software.
The typical enterprise and application stack is made up of over 50% open source technologies. This mass adoption has helped every organization increase developer productivity and software production, as well as speed up the adoption of new technologies.
While many companies take advantage of OSS to improve their products and infrastructure, they often lag behind in the management and support of the OSS technologies they use. However, due to the fact that an organization's process involves hundreds to thousands of OSS components, errors and vulnerabilities are likely to arise and affect the enterprise's process, risk profile and DevOps productivity.
In order to mitigate the possible risks posed by these vulnerabilities, organizations, software executives and risk analysts need to understand the underpinnings of their infrastructure in order to be ready to repel attacks and threats.
Most organizations are only aware of 2% of their OSS usage. Organizations and enterprises must establish an efficient and effective process for choosing, managing and remediating the OSS they base their company's success on.
In this webinar, We will provide guidance for understanding the fundamental framework, important issues and concerns in Open Source adoption within the Enterprise, and share expert thoughts and practical tips in maximizing the benefits of using open source technologies and the best practices in managing security and legal risks.
1. Open Source basics
2. Choosing commercial and Open Source (OSS) Technologies
3. Security Risks and Challenges
4. Opportunities and Threats
5. OSS Tools and Work Process
6. Recent Trends and Developments
A must-attend webinar for senior leadership in IT and technology.
This webinar will:
- Provide insight into the game-changing realities that are affecting the CSP business landscape.
- Define how CSP business strategy is changing.
- Deliver insight about how business operations can now offer a new level of capability for meeting the monetization needs of today’s changing business environment.
1.Security Controls Must Be Programmable and Automated Wherever Possible
2.Implement a Simple Risk and Threat Model for All Applications
3.Scan Custom Code, Applications and APIs
4.Scan for OSS Issues in Development
5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
6.Measure System Integrity and Ensure Correct Configuration at Load
7.Use Whitelisting on Production Systems, Including Container-Based Implementations
8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
9.Lock Down Production Infrastructure and Services
10.If Containers Are Used, Acknowledge and Address the Security Limitations
The data warehouse (DW) is one of the most effective tools for complex data analytics. But the downside is… it can drain your budget. How do you maximize the value of your DW and save on storage costs?
Don't clog your DW's analytics bandwidth with less valuable storage and ETL processing. Those in the know are migrating storage and large-scale or batch processing to data lakes built on scale-out architectures such as Hadoop and the Cloud to save on costs and get increased processing power for the DW.
Pradeep Varadan, Verizon's Wireline OSS Data Science Lead and Scott Gidley, Zaloni's VP, Product Management, discuss the benefits of augmenting your DW with a data lake. They also address how migrating to a data lake allows you to efficiently exploit original raw data of all types for data exploration and new use cases.
Topics covered include:
- Reducing storage costs
- Increasing process speeds
- Maximizing EDW for business intelligence
- Extending data retention and extracting more value from all data
About the Speaker:
Pradeep Varadan is a data scientist and enterprise architect who specializes in data challenges within telecommunications. As the Wireline OSS Data Science Lead at Verizon Data Services, Pradeep is tasked with providing a competitive edge focused on utilizing data analytics to drive effective decision-making. He is skilled in creating systems that can be used to understand and make better decisions involving rapid technology shifts, customer lifestyle and behavior trends and relevant changes that impact the Verizon Network.
Our bi-weekly webinar series will each focus on a few of the key benefits of open source software for enterprise.
Adoption of open source software (OSS) at the enterprise level has flourished, as more businesses discover the considerable advantages that open source solutions hold over their proprietary counterparts, and as the enterprise mentality around open source continues to shift.
In this three part series you will discover:
- How to make smart use of open source software
- Why Cassandra is a smart business decision
- How to ensure your applications run smoothly on Cassandra
- Why open source is the new norm
- How to leverage the power of the open source community
A long-held assumption about mobile technology in general is that endpoint security technologies are unnecessary since mobile operating systems (OSs) are inherently more secure than PC OSs. For policy enforcement and security on mobile devices, IT organizations have looked to enterprise mobility management (EMM) platforms for additional security and device control. However, there is a detection and enforcement gap between devices and back-end EMM, which does not provide real-time monitoring of app activity, network traffic, and overall endpoint health.
Mobile endpoint protection is critical and BYO complicates the issue since enterprises may or may not own the mobile endpoint. Employee owned devices introduce many more risks and variables than enterprises account for and we wish to inform you on this webinar. Join Phil and John to learn how to privately secure your BYO devices and measure the risks these devices bring into your network.
- How to privately secure BYOD mobile endpoints
- How to classify risky devices by examining installed applications
- How to create a plan to reduce risks introduced by mobile devices