Next generation packet transport networks (PTN) with a focus on Multi-protocol Label Switching Transport Profile (MPLS-TP) are becoming popular for service providers looking to deploy Software Defined Networks by leveraging OpenFlow and its extensions over a growing diversity of networking systems. One of the largest carriers in the world, CMCC has come up with an overall system specification for its software defined PTN (SPTN) using an OpenFlow southbound interface (SBI).
This presentation covers the high level specification and design considerations for a centralized PTN controller and implementing MPLS-TP technologies over OpenFlow in a service provider’s packet transport networks. It will also discuss the TTP extensions, developed by China Mobile and their partners, including key contributor Broadcom, to support this end-to-end use case. The webinar will further discuss the open software developed to run on existing switching silicon which can be deployed in a backhaul network.
Data centers and internet content providers (ICPs) are a vibrant and rapidly-growing market for optical equipment and are currently the center of market attention. But their needs are different than those of traditional carriers, and some of these requirements are well known and others are not. This webinar outlines not only the needs of data centers and content providers, but how equipment manufacturers are building tailored products to address the unique needs of these customers.
Who Should Attend
-Network operators, data center operators, financial analysts, and the media.
Key Topics for Discussion
-How architecture shifts in the data center are creating demand for more transport
-Where demand is coming from – it’s not just the big ICPs
-What role open hardware and software play in data center interconnect solutions
-How datacenter interconnect isn’t just metro, and why various approaches are needed
-Answers to audience questions during live Q&A
Modern applications are built to embrace unpredictability and interconnectivity across multiple clouds, legacy systems, and datastores. So how does one avoid cobbling together a slew of purpose-specific messaging and streaming technologies? How does one ensure consistent configuration of security policies, logging, and access to their distributed applications? And how do we do all that against the backdrop of ever-shrinking development cycles?
Join Jonathan Schabowsky from Solace and Kamala Dasika from Pivotal as they discuss:
- Data distribution challenges when connecting diverse endpoints and systems
- Patterns to help normalize the chaos
- Platform and messaging attributes that are key to supporting distributed architectures
Pivotal Privacy Statement:
Solace Privacy Statement:
This webinar addresses the environmental effects of coal mining and related transport, reviewing the potential environmental impacts arising at all stages of the coal chain. Potential environmental impacts from emissions of dust, water, and local land use are reviewed, highlighting emerging techniques to limit and reduce negative effects.
Examples of best practice for mine operation, transport logistics and dust control will demonstrate the potential for improved performance and environmental sustainability in the field. Socioeconomic impacts, as well as regional employment and community engagement, are also covered. In this day and age mining companies will need to comply with environmental law as well as demonstrating best practice and public engagement to have new projects approved.
Deliver best application performance, availability and reliability over any transport including consumer broadband. Forward error correction, tunnel bonding, integrated WAN optimization (Unity Boost), and SaaS optimization are some of the key features of the Unity EdgeConnect SD-WAN solution. Learn more about the Silver Peak SD-WAN Solution Unity EdgeConnect.Read more >
It's critical to anticipate cyber threats and mitigate them before they impact the business of aviation. As technology continues to commoditize and threats evolve, applying best practices for reducing cyber security risk in the air transport industry is key. During this webinar air transport security expert, Dave Ockwell-Jenner at SITA, will explain how:
• Threat intelligence improves security operations center (SOC) efficiency.
• Threat hunting and incident response are enriched by threat intelligence.
• Intelligence sharing can be done right, in the aviation security community and beyond.
Dave Ockwell-Jenner has an extensive background in technology: from building one of the internet’s earliest major websites, to helping secure some of the world’s most critical systems. In his current role with air transport industry IT provider, SITA, Dave leads a team of cyber security professionals dedicated to protecting critical infrastructure against cyber threats. Cyber threat intelligence is a central part of SITA's security strategy, not just to defend the enterprise, but to extend a suite of capabilities to customers, partners, and the industry as a whole. Originally from the UK, Dave now lives with his family in Kitchener, Ontario, Canada — home to one of Canada's most vibrant entrepreneurial and high-tech communities.
This webinar focuses on informing professionals working in infrastructure/logistics on the benefits of getting qualified with the IRM.
Topics include: IRM background, qualifications overview IRM qualifications, distance learning, blended learning and benefits of studying "The student experience and what I’ve gained"
Join NFC World, the GSMA and industry experts to find out about delivering standardised MIFARE ticketing services on NFC devices.Read more >
Transport infrastructure is a key facilitator for the efficiency of a company’s supply chain. Due to significant improvements in transport infrastructure within Sub-Saharan Africa, logistics in the region should also see positive impacts. This briefing will investigate transport infrastructure development in Angola, Ghana, Kenya, Nigeria, Mozambique and Tanzania, and its impact on the logistics market.
Why You Should Attend:
- Learn about transport infrastructure development in Sub-Saharan Africa
- Identify the impact of transport infrastructure development on the efficiency of logistics
- Discover how efficiency improvements will contribute to the ease of doing business within the region
In this webinar, 128 Technology and Light Reading will discuss the benefits of session-smart routers in SD-WAN deployments.
Network complexity not only increases IT costs, but can also create network fragility and security risks. Recent approaches to reducing network complexity through Software Defined Wide Area Networking (SD-WAN) offer some short-term relief, but are still largely based on decades-old network paradigms that only create more complexity in the long run.
Session Smart Networking is different. Session Smart networks can truly simplify the network, as well as provide a breadth of SD-WAN capabilities – including application visibility, software-define branches, multi-path routing and network segmentation. As a result, organizations using a Session Smart approach can realize breakthrough gains in performance, agility, security and scale.
In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa.Read more >
Increase the performance of your wide area network and worker productivity with key features that allow you to condition your connectivity, bond different links together to improve application performance, and define QoS profiles based on business policies to ensure that receive the priority, performance and availability they require.Read more >
IT leaders in the Travel and Transport sector are telling us that they are constantly fighting a battle with budget cuts and rising costs against the demand for bigger efficiencies, quicker processes and most importantly improved customer service.
HP Software has a wealth of expertise in this sector helping IT teams overcome these challenges and deliver more value to the business.
Featuring case studies from customers such as United Airlines, Virgin Atlantic, Deutsche Bahn, Travelport and Carlson Wagonlit, on this webcast you'll hear how HP Software solutions helped them improve the quality of their applications, become more efficient and demonstrate clear ROI to the business.
At the end of the session there will be a live Q&A where you will be able to discuss key issues with our industry experts.
If you are involved in Application Delivery, IT Infrastructure, IT Security, Information Management or IT Project and Portfolio Management, then join this webcast to hear how HP Software has enabled your peers to Perform Better.
It’s been a tough couple years for crypto protocols. Almost every month a new vulnerability in TLS is announced that causes panic and distress to the security and IT communities. In this talk I’ll explain the latest set of cryptographic vulnerabilities in an accessible manner. By the end of the talk you’ll hopefully know the difference between FREAK, LogJam, DROWN, Sweet32, POODLE and SLOTH. We’ll be breaking good crypto and bad with side-channels, signing oracles and downgrades. I’ll also explain how the latest changes to TLS are supposed to fix things and how the entire house of cards may topple once quantum computers arrive.Read more >
From Security B-Sides San Francisco 2013Read more >
Over the last 2 years, 100-gigabit Ethernet has been deployed over optical transport network (OTN) systems and distributed over DWDMs. Now is the time to test it all. However, two key questions arise:
What tests should be performed?
How long should the tests last?
This webinar addresses the appropriate testing method for high-speed networks. Based on industry standards and forums, EXFO is proposing a simple, yet complete test methodology that should help today’s network operators.
Today’s digitally-driven business model, the rapid adoption of cloud services and shifting traffic patterns are causing IT professionals to re-evaluate WAN architecture. In parallel, there is increasing pressure on enterprise IT to enhance business agility by bringing new sites and new applications online more quickly.
Software-defined Wide Area Networks (SD-WAN) provide an entirely new, business-driven approach to the WAN. They enable active, secure use of multiple forms of transport services, including broadband, to connect users to applications – wherever they reside. This not only improves application performance but also increases resiliency. Centralized orchestration and zero-touch provisioning greatly simplify the tasks of deploying new sites or applications, often eliminating the requirement to send IT experts out to branch locations.
This webinar will reveal how an advanced business-driven SD-WAN can become a strategic accelerant for an enterprise’s digital transformation initiatives. You will learn how Gerresheimer, a global manufacturer of specialty glass products, deployed the Silver Peak EdgeConnect SD-WAN platform to augment MPLS with lower cost, high speed broadband services to achieve a 2x to 3x increase in application performance while lowering overall bandwidth costs. Greg Taylor, Head of IT Infrastructure, will describe how adopting a business-driven SD-WAN delivers a better, more predictable and consistent quality of experience for Gerresheimer employees around the world.
Biometrics has slowly become more and more present in our everyday lives. We no longer bat an eyelid when our phones require us to use a finger print for a payment or even when its how you get into your gym. So whats the next step?
Cubic, who are the people behind the payment technology of the London Transport System, have devised a system that can double the “throughput” of an entrance—from 25 people crossing a gate’s threshold per minute, to about 50 or 60. This idea could mean that we would no longer have gates at tube stations across London and instead your phone in combination with your face.
Niosha Kayhani of Cubic will be taking us through the development of this Technology and also the growing uses and industry that is Biometrics.
Revenues from business services are growing at a fast pace with customers demanding a high quality of service and experience in return for premium services. Operators have long struggled to assure the delivery of services across an increasingly complex network. To succeed in this challenging market, the following are critical:
•Assuring E2E IP performance
•Delivering stringent SLAs
•Supporting the delivery of demanding VoIP and Video applications
To support these efforts, EXFO is introducing dedicated solutions that effectively solve issues for business services providers.
Join us for this short presentation as we cover:
1.Assuring business services: challenges and opportunities
2.Different assurance methods for business services
3.How to leverage the cloud for a probeless approach
Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide communication security over the Internet. Both SSL and TLS use asymmetric cryptography for authentication of key exchange, symmetric encryption for confidentiality and message authentication codes for message integrity. In this presentation, Anthony J. Solano - Chief Technology Officer at UKI will explore the fundamentals of the protocol and give visual examples of how it is implemented. Through the analysis of high profile hacks, Mr. Solano will reveal system vulnerabilities and explore how existing countermeasures address the attackers. The presentation will conclude with actionable steps to help lock down your personal and organization’s vulnerable attack surface.Read more >
Achieving your ADME/Tox testing goals requires experience, quality data, and proper alignment with regulatory guidance. Failure to meet these important requirements can put your drug discovery and pre-clinical goals at risk.
This presentation will provide an informative overview of how you can advance and reach your pre-clinical drug discovery goals. It will discuss the importance of core contract research capabilities, including enzyme induction, enzyme inhibition, and transporter interaction. In addition, we will review new capabilities and opportunities including CYP induction and SLC transporter assay services – all designed to align with regulatory agency guidance documents.
David Stresser is the Program Manager of Corning® Gentest℠ Contract Research Services at Corning Life Sciences since 2001, having held prior positions of Product Manager and Study Director since joining Corning in 1998. Prior to this, he was a post-doctoral associate in the laboratory of David Kupfer at the University of Massachusetts Medical School in Worcester, Massachusetts. He did his graduate work in the laboratory of David E. Williams at Oregon State University in Corvallis, Oregon receiving a Ph.D. in toxicology in 1994. Dr. Stresser has authored or co-authored 40 articles or book chapters in the field of drug metabolism and has been an invited speaker at various national and international meetings, pharmaceutical companies, and universities.