People have been telling stories with pictures since early man painted scenes of animal hunts on cave walls. These stories often recorded military victories, such as in Egyptian hieroglyphs and battle tableaus featuring chariot riding pharaohs, Assyrian palace bas-reliefs depicting monumental sieges, and the war columns of the Roman emperors Trajan and Marcus Aurelius. These were the YouTubes of their day.
Kudos to the organizers who do a great job of keeping this long running event fresh and relevant, even as they continue adding acronyms to its name. I had the distinct pleasure this year of presenting an opportunity for SPs to offer cyber security as a managed service to business customers, by exploiting network function virtualization.
In consumer marketing we are familiar with the concept of giving a way one product (or selling it at a heavily discounted price) in order to build a market for even larger sales of another product. Giving away the razor to sell the blades is the classic example, and a more modern one is giving away the printer to sell the ink cartridges.
Network slicing is the ability to carve out and dedicate different sets of resources, end-to-end, from a common network, to support different types of service. It is tightly linked with 5G mobile, where its role is to magically provide networking support for 5G’s multiple service classes – headlined by high-speed mobile broadband, low-latency critical communications, and massive IoT.
The alchemists of our age, scientists and engineers, have transformed chemical compounds like gallium-arsenide, indium-phosphide, and silicon into miniaturized lasers, light detectors, and thin tubes of glass that combine to communicate information over long distances at unimaginably fast speeds.
All public or private telecommunications network are supported by a high speed optical backbone. And while all optical backbones have common core requirements – namely to provide an array of client interfaces and high capacity network transport between them – there are quite some variations in other requirements depending on the underlying business.
In a previous blog, I discussed how equipment providers are facing a lucrative but pitfall-laden path in deciding how to invest in NFV to displace dedicated appliances. CSPs have similar NFV investment decisions to make on the user side of the equation. They need to answer the question: “Where should I start implementing an NFV strategy to deliver network functions and customer services as a means of improving my bottom line and business success?”
If you haven’t yet read the Innovator’s Dilemma, you should. This seminal book by Clayton Christensen is now approaching its 20th anniversary and is as relevant as ever. It analyzes the hair pulling difficulties that incumbents face in embracing disruptive technologies that can reshape industries and shift the balance of power between newcomers and themselves.
Microsoft is central to three classic examples. They grabbed the PC software market from IBM, very nearly ceded the Internet browser market to Netscape, and then by ignoring search engines until it was too late, ignominiously lost the Internet advertising market to Google.
When the Shannon Limit was set forth in the mid-1900s governing the theoretical limit of information carrying capacity of a communications channel, it was impossible to imagine that this would someday be applied to fiber optics communications that was not even conceived of at that time.