Posts about Network Virtualization

For this post I met up with DartPoints CTO Satya Baddipudi to discuss where best to locate virtual functions, when NFV will hit the mainstream and how a software approach to service chaining can replace the “conga line” of devices. Prayson: Satya, could you start off by telling me a little about your company's role in the NFV transformation? Satya: At DartPoints we had been taking a cautiously optimistic view of the NFV technology, and now we’re moving to be one of the early adopters. Most of our deployments are greenfield, which is a little different from the other ISPs and CSPs. This enables us to be receptive to new technologies and innovations, wherever it ...
Read the full post

These days I travel by plane a lot, but I didn’t travel much in the pre-deregulation (before 1978) glory days of airlines. My parents, relatives and neighbors rarely flew, mostly because air travel was very expensive.At the same time, most people felt that flying was a good experience, where people dressed up, seats were spacious and meals were included.With deregulation came ...


Read the full post
The Internet of Things (IoT) is finally upon us with a myriad of machines and sensors set to connect all aspects of our lives. According to Cisco, over 50 billion devices will be talking to each other by 2020. Soon, any conceivable object that could benefit from internet access will become part of the IoT from toothbrushes to televisions to traffic control. But amid all the excitement, it's easy to overlook the challenges that this unprecedented explosion in connectivity will present. Perhaps the most significant of these issues is security. How will all this information be shared appropriately between so many devices without it falling into the wrong hands? It's going to be great when a doctor can receive live updates from a patient's pacemaker but not so good if that sensitive data gets intercepted. Your friends and family will certainly find it useful to know your exact location when you're out and about. Unfortunately, so will thieves. With so many smart devices and IP addresses interacting, a whole new world of opportunity for cybercriminals could be about to open up. When you consider the real danger that the virtual world will pose on the physical, the need for urgent action becomes obvious. Just think of the harm that could come from wireless carjacking, not to mention ...
Read the full post

There’s a lot of talk and plenty of noise related to NFV in the telecom industry. It’s a time of market transformation with many executives and marketers making claims for how their companies are doing NFV better than others, or how they are ahead of the competition in one or more ways. I think we are missing an important voice: The CTOs. I am talking with my peers from service providers and suppliers to get a sense of what is real. I am sharing these conversations in this series called The Real CTOs of NFV. The title is fun but the intent is serious. Following is my second Real CTO conversation with Doug Suriano of Oracle...


Read the full post

There’s a lot of talk and plenty of noise related to NFV in the telecom industry. It’s a time of market transformation with many executives and marketeers making claims for how their companies are doing NFV better than others, or how they are ahead of the competition in one or more ways. I think we are missing an important voice: The CTOs. I am talking with my peers from service providers and suppliers to get a sense of what is real. I will be sharing these conversations in a series called The Real CTOs of NFV. The title is fun but the intent is serious. Following is my first Real CTO conversation with Martin Taylor of Metaswitch ...

Read the full post