In this third webinar part of a series of ‘Winning with Fibre’, we will focus on the OSS/BSS transformation - especially on the delivery phase of it. While agile methods have been widely used in software development, it is still relatively new way of doing large telco transformation projects. POST Luxembourg, an innovative CSP from Europe, is in the middle of their transformation covering a vast amount of BSS and OSS systems. POST Luxembourg case provides is a great example of a transformation project which has successfully adopted agile ways of carrying out
the project in manageable increments.
Sign up now and get insights into the POST case!
This guest webcast features Jake Kouns of Risk Based Security and Christine Gadsby of Blackberry who will be giving their Black Hat 2016 talk, analyzing the real risk of using OSS and the best way to manage its use within your organization.
Through real world examples and personal experience, the speakers will...
- Examine the current hype around OSS, highlighting what organizations should be the most concerned about, and how to evaluate the true cost of using OSS
- Explore how to utilize learnings from your incident response function to create smarter products and avoid maintenance costs of OSS
- Introduce a customized OSS Maturity Model and walk through the stages of organizational maturity with regards to how they prioritize and internalize the risk presented by OSS
Learn more about Jake Kouns:
Learn more about Christine Gadsby:
It’s everywhere. From your phone to the enterprise, open source software (OSS) is running far and wide. Gartner predicts that by 2016, 99 percent of Global 2000 enterprises will use open source in mission-critical software. While it’s free, easy to find, and pushes software to the market faster, it’s vital to understand how to use OSS safely.
Join Richard Sherrard, director of product management at Rogue Wave, for a live webinar reviewing the top five OSS trends of 2015. From OSS discovery, to risk, and governance, we’ll take a deep dive into the trends we’ve noticed this year while providing you with some predictions for 2016.
In this webinar you’ll learn how to:
-Discover the OSS in your codebase to ensure that code is free of bugs, security vulnerabilities, and license conflicts
-Implement controls on OSS usage at your organization
-Create a multitier approach to OSS risk reduction with open source tools, static code analysis and dynamic analysis
Converging telecommunication networks - one comprehensive data model for OSS and IT automationRead more >
Konvergenz in Telekommunikationsnetzen – ein übergreifendes Datenmodell für OSS und IT Automatisierung
Die integrierte Verwaltung aller Netz- und Serviceressourcen in Telekommunikationsnetzen bildet die Basis einer modernen OSS/BSS Architektur. Die Konvergenz der Technologien führt aber gleichzeitig zu einem Verschmelzen von OSS und IT Themen. Weiterhin werden im Rahmen von Virtualisierungen in naher Zukunft verstärkt auch Aufgabenstellungen aus dem Netz in das Data Center verlagert. Die Herausforderung für die Netzbetreiber ist somit, Transparenz über alle Ressourcen der gesamten Service-Kette zu erhalten, d.h. von der physikalischen, über die logische bis zur Service Ebene und von Telekommunikation über IT bis Data Center. Diese Transparenz ist die Grundlage für alle Planungs- und Engineering, Service Fulfillment und Service Assurance Prozesse und bildet somit die Basis für jegliche Art der OSS und IT Automatisierung. Neben funktionaler Themen in den unterschiedlichen Bereichen steht also insbesondere die für einen effizienten Netzbetrieb zwingend erforderliche Durchgängigkeit im Vordergrund. Das übergreifende Datenmodell bildet die Basis für die „out of the box“ integrierten Lösungen von FNT Command, wodurch diese nahtlose Navigation zwischen den unterschiedlichen Layern und Bereichen ermöglicht wird.
In this dynamic webinar you’ll hear from Axel Clauberg, who is responsible for Deutsche Telekom's IP Architecture and Designs for fixed and mobile networks. Mr. Clauberg is an outspoken advocate for the standardization of real-time OSS, and will reveal critical information for Network Equipment Providers, Service Providers and Systems Integrators. This webinar will demonstrate the importance of leveraging IETF standards of NETCONF and YANG, which can provide enormous cost savings, innovation benefits and vendor flexibility for Service Providers.Read more >
Learn how to overcome the challenges of building Scalable Iot Apps with OSS Database Technologies.Read more >
For service providers migrating to SDN and NFV, operationalizing new, virtualized services in a hybrid environment requires modernizing the existing BSS/OSS environment and unifying cloud, resource and service orchestration. Without both, monetizing new applications and services is exceedingly difficult if not impossible. In this webinar, NEC/NetCracker will discuss the migration path to generating revenue from new, virtualized services and applications, highlighting practical recommendations for modernizing the BSS/OSS alongside essential orchestration solutions.Read more >
Join Incognito Software and TVC for this free one hour webinar as we discuss:
- How you can tackle the pressures brought on by increasing subscriber and device demands
- How a converged OSS solution can fulfill the end to end role needed to help you deliver and manage IP services
- How to enhance customer experience and deliver flexible, value-added services
This webinar features service assurance research content from Analysys Mason, and a tools consolidation case study on how Broadvox drove their IT and OSS transformation with unified service assurance from Monolith Software.Read more >
The popularity of Open Source Software (OSS) Technologies in the recent years has greatly impacted the development and innovation of software.
The typical enterprise and application stack is made up of over 50% open source technologies. This mass adoption has helped every organization increase developer productivity and software production, as well as speed up the adoption of new technologies.
While many companies take advantage of OSS to improve their products and infrastructure, they often lag behind in the management and support of the OSS technologies they use. However, due to the fact that an organization's process involves hundreds to thousands of OSS components, errors and vulnerabilities are likely to arise and affect the enterprise's process, risk profile and DevOps productivity.
In order to mitigate the possible risks posed by these vulnerabilities, organizations, software executives and risk analysts need to understand the underpinnings of their infrastructure in order to be ready to repel attacks and threats.
Most organizations are only aware of 2% of their OSS usage. Organizations and enterprises must establish an efficient and effective process for choosing, managing and remediating the OSS they base their company's success on.
In this webinar, We will provide guidance for understanding the fundamental framework, important issues and concerns in Open Source adoption within the Enterprise, and share expert thoughts and practical tips in maximizing the benefits of using open source technologies and the best practices in managing security and legal risks.
1. Open Source basics
2. Choosing commercial and Open Source (OSS) Technologies
3. Security Risks and Challenges
4. Opportunities and Threats
5. OSS Tools and Work Process
6. Recent Trends and Developments
A must-attend webinar for senior leadership in IT and technology.
This webinar will:
- Provide insight into the game-changing realities that are affecting the CSP business landscape.
- Define how CSP business strategy is changing.
- Deliver insight about how business operations can now offer a new level of capability for meeting the monetization needs of today’s changing business environment.
Join Bitnami and AWS Marketplace for best practices in building and managing websites with open source software, and a look into the accelerating growth of the open source community.
In this webinar, Bitnami will showcase the benefits and differences between popular content management systems (CMS) like, Wordpress, Joomla, and Drupal in order to find the best CMS to build your website. With Bitnami, users are able to launch a secure, optimized, and ready-to-run open source application in minutes. Find out how you can focus on building and managing your website without tedious setup, using an image you can trust is up-to-date and free of security vulnerabilities with Bitnami.
At the conclusion of the webinar, attendees will be given the chance to launch OSS through AWS Marketplace and receive $25USD in AWS credits.
According to industry research, enterprise use of open source software (OSS) is on the rise. Development organizations in Enterprise and all sectors are examining the case for using open source software for applications within their own IT infrastructures as well as in the software they sell.
Bitnami-packaged applications have been downloaded over 2 million times and deployed by users around the world, ranging from consulting companies to governments, universities to non-profits, and Fortune 500 companies.
Open Source Software (OSS) on AWS can present the opportunity for efficiency and savings in developing applications. AWS Marketplace makes it easy to locate, procure, and include OSS in your development and testing organizations, making it easier to run your overall business.
Thanks for your interest in our webcast where we will be discussing how to secure applications that rely on third-party and open source software.
Aside from the data they collect, create, and store, applications can oftentimes be an organization's greatest digital asset. Building custom applications to match the customer and market demands mapped to revenue objectives and available resources can be tremendously rewarding, but also a potentially-huge undertaking.
Ultimately, time to market is always a factor ... a requirement that almost always wins out over security. One way to tackle the time and effort to deliver more quickly is to leverage third party and open source components. But, do these elements save you in the long run - or do they introduce more risk in the form of potential vulnerabilities that are either not easily uncovered (at best) or not easily patched (if patchable at all)?
To answer these questions and more, we've pulled together a group of experts that deal with these challenges on a daily basis. During their conversation, webinar attendees will learn:
- What the value of open source software (OSS) is
- What are some common cases where open source software is utilized in today's applications
- What are the security risks and pitfalls when using OSS
- A view into a few case studies for companies that have fallen victim to the risks of using OSS
- How have companies identified and mitigated the risks associates with the OSS component, Struts
- How to tune the secure software development lifecycle (SSDLC) to account for the use of open source software
Remember, when you register for this expert webcast you will also receive a download link for a new white paper titled "Application Security in an Open Source World."
Sean Martin, Editor-in-Chief, ITSPmagazine
Kunal Anand, Co-Founder and CTO, Prevoty
Rob McCurdy, CIO, MSU
Nate Smolenski, CVP, New York Life
Andy Wickersham, AppSec Leader, Fortune 100 Co.
1.Security Controls Must Be Programmable and Automated Wherever Possible
2.Implement a Simple Risk and Threat Model for All Applications
3.Scan Custom Code, Applications and APIs
4.Scan for OSS Issues in Development
5.Treat Scripts/Recipes/Templates/Layers as Sensitive Code
6.Measure System Integrity and Ensure Correct Configuration at Load
7.Use Whitelisting on Production Systems, Including Container-Based Implementations
8.Assume Compromise; Monitor Everything; Architect for Rapid Detection and Response
9.Lock Down Production Infrastructure and Services
10.If Containers Are Used, Acknowledge and Address the Security Limitations
Our bi-weekly webinar series will each focus on a few of the key benefits of open source software for enterprise.
Adoption of open source software (OSS) at the enterprise level has flourished, as more businesses discover the considerable advantages that open source solutions hold over their proprietary counterparts, and as the enterprise mentality around open source continues to shift.
In this three part series you will discover:
- How to make smart use of open source software
- Why Cassandra is a smart business decision
- How to ensure your applications run smoothly on Cassandra
- Why open source is the new norm
- How to leverage the power of the open source community
The data warehouse (DW) is one of the most effective tools for complex data analytics. But the downside is… it can drain your budget. How do you maximize the value of your DW and save on storage costs?
Don't clog your DW's analytics bandwidth with less valuable storage and ETL processing. Those in the know are migrating storage and large-scale or batch processing to data lakes built on scale-out architectures such as Hadoop and the Cloud to save on costs and get increased processing power for the DW.
Pradeep Varadan, Verizon's Wireline OSS Data Science Lead and Scott Gidley, Zaloni's VP, Product Management, discuss the benefits of augmenting your DW with a data lake. They also address how migrating to a data lake allows you to efficiently exploit original raw data of all types for data exploration and new use cases.
Topics covered include:
- Reducing storage costs
- Increasing process speeds
- Maximizing EDW for business intelligence
- Extending data retention and extracting more value from all data
About the Speaker:
Pradeep Varadan is a data scientist and enterprise architect who specializes in data challenges within telecommunications. As the Wireline OSS Data Science Lead at Verizon Data Services, Pradeep is tasked with providing a competitive edge focused on utilizing data analytics to drive effective decision-making. He is skilled in creating systems that can be used to understand and make better decisions involving rapid technology shifts, customer lifestyle and behavior trends and relevant changes that impact the Verizon Network.