Archive For January, 2016

5 articles
More than NFV: Transformations in Networking Bring Challenges and Opportunities

More than NFV: Transformations in Networking Bring Challenges and Opportunities

By Charlie Ashton With all the industry hype around Network Functions Virtualization (NFV), it’s easy to lose track of the fact that telecom infrastructure is not the only segment of the networking market that’s undergoing radical transformation. Business of all kinds are benefitting from the wide-ranging evolutions of the networks they depend on. Billions of consumers, most of  whom are…
2nd International Workshop on MILS

2nd International Workshop on MILS

By Paul Parkinson Earlier this week, I had the opportunity to attend the 2nd International Workshop on MILS: Architecture and Assurance for Secure Systems in Prague, which was organised by the EURO-MILS consortium​, and was co-hosted with the HiPEAC 2016 conference​​ on computing architecture, programming models, compilers and operating systems for embedded and general-purpose architecture. I was very interested to…
What does “open” really mean in the context of NFV?

What does “open” really mean in the context of NFV?

By Charlie Ashton 2015 was certainly an interesting year for Network Functions Virtualization (NFV). It was the year when it became clear that the early use cases will likely be virtual CPE applications that offer a compelling business case for Return-on-Investment (ROI) and which can be implemented with minimal technology risk. It was the year when the ETSI initiative moved…
Two to Tango: When Hardware Met Software

Two to Tango: When Hardware Met Software

By Andreea Volusincu Try going incognito on Google (as if you’re on a covert mission), and type “Why is embedded software so” and see what you get. It’s an interesting a dilemma. Autocomplete is a wonderful thing. You can certainly question how accurately the suggested word fits your search, but it still says a lot about what popular perceptions and…