article thumbnail

Operations platform for private 5G networks can meet the specific needs of many vertical industries

TM Forum

Promoting private 5G networks in vertical industries is challenging for various reasons. To address this diverse market, China Unicom based its ecosystem-based platform for network operations on cloud architecture to offer verticals a differentiated, customized end-to-end 5G private network service to meet their specific needs.

Meeting 130
article thumbnail

Composite orchestration is the key to delivering hybrid services through NaaS architecture

TM Forum

A major initiative used TM Forum’s Network as a Service (NaaS) framework to enable Ericsson’s composite orchestrator capability across multiple domains and vendors, to deliver low latency, simply integrated, network edge environments. Visual management of order execution. and resolution of stuck orders.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

My API story: Vodafone's API Architecture Guild

TM Forum

I am part of the Digital, BSS & APIs architecture team in Vodafone, focusing on APIs standardization, strategy, and roadmaps. In my role, I'm currently leading a distributed architecture function called the API Architecture Guild. Florin Tene, Vodafone. external_url. TMF629 - Customer management. TMF678 - Customer Bill.

article thumbnail

5 reasons to move to a network platform

CIO Business Intelligence

In today’s era of dynamic disruption, IT leaders are taking center stage in navigating a complex and vast network. On top of that, how do you build a resilient network that can protect your people, systems, and data from external threats? The answer is the network platform. Navigating these complexities can be challenging.

Network 91
article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

When making decisions about network access, businesses need to be aware of and assess the security implications associated with network technology to help keep their digital assets protected. Cyber hygiene best practices include device security , cyber security education , and secure networking strategies.

article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Integrating a new network after an acquisition can be a sizable headache for any CIO. Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. It’s more complicated than standard networking, Hoag says. Laying the foundation.

CTO 88
article thumbnail

Identity Based Internet Protocol (IBIP): A network security innovation developed at The MITRE Corporation

CTOvision

Editor’s note: I’ve referenced before my participation on the board of Centripetal Networks , and their ability to deliver large scale commercial solutions of MITRE’s IBIP are an area I am particularly proud of. This means, for the first time, a means can be put in place to prevent covert tunnels in enterprise networks.

Internet 270