VDC RESEARCH REPORT

VDC Research Report: Securing IoT Systems With Secure Devices

Rapid technological changes and an increased pace of innovation are driving Internet of Things (IoT) deployments. Organizations now have to contend with their traditional engineering challenges while adding new and unfamiliar technologies and security risks. As a result, many embedded developers admit they are not doing enough to address security. This VDC Research report examines the impact security is having on embedded developers and provides insights into designing security into deployments.

Learn

  • About increased security threats and their impact on intelligent connected devices
  • VDC's recommendations for a security paradigm shift
  • Three security best practices VDC recommends for IoT systems

WHITE PAPER

Five Steps to Improving Security in Embedded Systems

In today's increasingly interconnected world, security breaches are becoming ever more prevalent, with escalating complexity challenges. How can embedded device developers balance the need for tighter security with competing business and market demands? This paper outlines five steps for building additional security assurance into embedded devices by considering the whole product lifecycle.

Learn

  • How to balance needs for improved security with tight schedules and budgets
  • How to improve embedded system security through a five-step framework
  • How to apply the improvement framework to your embedded development project

WHITE PAPER

Cybersecurity and Secure Deployments

Creating Effective Security with Simulation Technology

WHITE PAPER

A Survey of Information Security Implementations for Embedded Systems

Different embedded devices, systems, and industries have varying security requirements and often require a custom lens. This paper will provide an introductory-level explanation of the CIA triad implementations based on confidentiality, integrity, and availability, and how each relates to an embedded device and system.

LEARN

  • Security implementations of the CIA triad as applied to embedded systems
  • How these implementations can be used to defend against various attacks against embedded systems
  • How a defense-in-depth approach is used to secure an embedded system

WHITE PAPER

Wireless Network Virtualization: Ensuring Carrier Grade Availability

Although 4G LTE is effective at meeting today's increasing bandwidth demands at lower costs than its predecessors, its mobile base station, E-UTRAN Node B (eNB), located at the edge of the radio access network (RAN), is underutilized at certain times of the day and has grown in complexity, resulting in higher downtime and field maintenance costs. As a result, the eNB is a good candidate for network functions virtualization (NFV). The virtualized eNB functions result in significantly higher equipment utilization, cost-efficient redundancy to achieve high availability, and lower operations and maintenance costs when compared to the legacy RAN.

Learn

  • Reliability and cost differences between RAN and C-RAN
  • Key components of an effective C-RAN solution
  • How a carrier grade infrastructure enables NFV solutions like C-RAN and others

WHITE PAPER

vRAN: The Next Step in Network Transformation

Boost Capacity, Reduce Cost, and Enhance Customer Experience with Wind River, Altiostar, Amdocs, and Dell EMC

Explosive growth in mobile traffic, fueled by smartphone subscribers consuming and sharing video, is expected to continue in the next wave of 4K, 8K, and 3D formats, along with augmented and virtual reality apps. Connecting subscribers to their favorite media—regardless of location—and providing a better quality of experience are becoming key retention strategies for service providers. In addition to video traffic, the increase of data coming from a multitude of IoT applications will surely test the network. Meanwhile, communications service providers (CSPs) are under pressure to lower their prices, enhance user experience, be competitive, and reduce churn.

With these factors, conventional RAN cannot keep up. It cannot aggregate capacity, nor can it handle local traffic surges. In addition, the current infrastructure is costly to maintain, and difficult to scale.

This paper discusses the business need for a vRAN solution and how it can provide 5G benefits for CSPs in a 4G network. It also describes some of the key requirements for a robust vRAN deployment, and the components of an end-to-end solution provided by Altiostar, Amdocs, Dell EMC, and Wind River®.

LEARN

  • How CSPs can take advantage of 5G benefits on a 4G network
  • Key requirements for implementing a vRAN solution
  • Features of a three-layer decoupled solution that enables service providers to deploy best-of-breed, open and interoperable solutions with no vendor lock-in
 

WHITE PAPER

Flexibility, Performance, and Reliability for Managed Business Services

A Complete Enterprise vCPE Solution from Wind River,
Versa Networks, and Dell EMC

Your customers look to you to provide routing, security, and SLA-backed network connectivity at a competitive price. How you deploy those services (via central office or on premises) depends on the customer's needs. Now you can provide those services with the carrier grade reliability your customers depend on—and the flexibility and performance you need to drive new revenue streams while keeping your costs down.

Dell EMC, Versa, and Wind River® have teamed up to create a highly efficient, dynamic, and reliable service-rich virtual enterprise CPE (vE-CPE) reference platform that also has the benefit of being very cost-effective.

LEARN

  • Thick and thin branch deployments and how to choose which is right for you
  • How ease of use, efficiency, and longevity help to make the vE-CPE solution cost-effective
  • How the Titanium Cloud Ecosystem leverages open solutions to ensure interoperability and break vendor lock-in
 
 

BENCHMARK REPORT

Tolly Report: HPE NFV System

Helion OpenStack Carrier-Grade Performance & Reliability Powered by Wind River Titanium Cloud

Spirent Communications commissioned Tolly to evaluate the performance and reliability of the Hewlett Packard Enterprise (HPE) Helion OpenStack Carrier Grade (HCG) Network Functions Virtualization (NFV) solution powered by Wind River® Cloud™. Tolly evaluated the solution performance in various virtual switch configurations and benchmarked recovery time in a variety of scenarios, including VM live migration, LAG failure, compute, and controller failures. The solution delivered high-throughput, consistent performance, and effective responses to failure scenarios.

LEARN

  • How the performance of Titanium Cloud was verified by the leading provider of testing and third-party validation and certification services, The Tolly Group
  • The specific tests performed to determine carrier grade performance and reliability
  • The detailed results from tests to measure: virtual switch and VNF forwarding performance, latency, and more
 
 

 

Open Source Infrastructure Software for vRAN Deployment and Operation

A Heavy Reading White Paper

REGISTER TO DOWNLOAD THIS WHITE PAPER

 
 

The registration service is not available at this moment. Refresh the page and try again. If the registration form is not available try again later or contact the webmaster

 

The mobile RAN is increasingly software driven and open. The largest vendors are migrating from highly aggregated and optimized single-vendor systems to more modular, open platforms. In parallel, a new wave of challengers is adopting open source and software-led design principles to develop new virtual RAN (vRAN) systems optimized for cloud deployment and operation. A recent white paper from Heavy Reading focuses on the software infrastructure operators need to deploy and operate vRAN commercially at scale. Specifically, it discusses the suitability of the open source StarlingX Project software to support deployment and operation of vRAN on distributed infrastructure.

LEARN

  • How an open source 5G vRAN architecture can help meet the operational challenges of managing thousands of nodes
  • An overview of open source RAN initiatives such as Open Air Interface, O-RAN, and TIP OpenCellular
  • How StarlingX management of upstream Kubernetes and OpenStack clusters supports performance-intensive high-throughput applications
  • Why the ultra-low latency, scalability, and flexibility of StarlingX make it ideal for edge deployments
 

WHITE PAPER

NFV: The Myth of Application-Level High Availability

When designing Network Functions Virtualization (NFV) solutions, some software providers approach the problem of high availability through application-level redundancy schemes (load balancing, check pointing, journaling, etc.). But application-level high availability by itself doesn't achieve the goal of five-nines (99.999%) reliability—the standard set by service providers using traditional network infrastructure based on physical equipment. In this paper, find out how to ensure five-nines availability for services delivered in an NFV implementation.

Learn

  • Some common misconceptions about how "high availability" is achieved
  • A contextual view into ETSI recommendations from the Architectural Framework and Resiliency Requirementss
  • A brief overview of a comprehensive solution to deliver a robust, high availability, NFV infrastructure solution