Big Switch Networks - Introducing Elastic Pricing

| April 5, 2017

article image
Big Switch first brought hyperscale networking architecture to customers, and has now introduced a hyperscale-inspired elastic pricing model to provide customers with flexibility, reduced cost and a pay-per-use consumption model for Hardware, Software and Support.

Spotlight

Cymmetria

At Cymmetria, we are focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable

OTHER ARTICLES

You’ve Heard of 5G. Now Meet Wi-Fi 6.

Article | April 9, 2020

Got Wi-Fi problems? Future routers will at least be ready for the next pandemic. With much of the U.S. on home lockdown to stop the spread of the coronavirus, we’re all more aware than ever just how important Wi-Fi is — and it’s something many of us probably took for granted until now. Before the pandemic, most everyone was focused on 5G, the next big thing in mobile-internet technology, and the possibilities it would create for our smartphone-brandishing on-the-go lifestyles. The country has been in a hurry to build out new 5G wireless networks that are fast enough to do things such as download movies in the blink of an eye, and someday even power driverless cars. Except “on the go” and “drive” don’t mean much when we’re literally not going anywhere these days.

Read More

Why the coronavirus response may unleash 5G

Article | April 14, 2020

Before the COVID-19 crisis, the biggest news in tech was the ongoing -- and controversial -- rollout of the 5G network. First, there was the ban on Chinese companies, prohibiting them from being involved with 5G infrastructure in the U.S., U.K. and Australia. Then articles started pointing out that the threat profile for 5G was an order of magnitude higher than that of existing telecom protocols. The coronavirus outbreak, though, has forced some analysts to reassess the value of 5G. While security concerns remain, the network has been invaluable in the fight against the pandemic.

Read More

A SMART FUTURE: HOW 5G AND SMART DEVICES WILL CHANGE THE WORLD

Article | March 2, 2020

When one thinks of 5G, they think of cellphones and how communication will improve with faster internet. It will do so for sure, but that’s a very limited way of thinking about this great technological feat. What 5G will inexplicably revolutionize is the way we interact with machines and how integrated they become with our lives. Combined with AI, and smart devices we’re looking at a whole new way of life. So, let us look at what it all means for the future. Before we move further, we must look at what 5G is and how it is different from 4G. First off, this new technology comes with OFDM encoding which is part of an air interface design especially modeled to be flexible such that it meets the needs of other tech pieces with different bandwidths as well as scale for future applications. Compared to 4G, it will be able to operate on larger channels and that too, with lower latency. This means more people can work online at the same time easily with low lag times.

Read More

Incumbent vendors cannot ignore the market-disrupting implications of AT&T’s and Swisscom’s outsourced 5G mobile cores

Article | July 1, 2021

At the tail-end of June, both AT&T and Swisscom announced plans to outsource their 5G mobile core networks to cloud service providers. AT&T’s announcement was with Microsoft Azure. Swisscom’s was with AWS. With the AT&T deal, Azure will be acquiring IP and engineering expertise from AT&T that it can resell to other operators. It was reported that Azure will offer jobs to current AT&T employees, as well. This move suggests Microsoft understands how critical it will be to retain talent that has deep networking knowledge. Swisscom’s deal does not appear to include AWS acquiring any Swisscom assets or employees, but the operator did say it will be using AWS for its own IT applications.

Read More

Spotlight

Cymmetria

At Cymmetria, we are focused on changing the asymmetry of cybersecurity, tilting the traditional security odds so that hackers are the ones who are left vulnerable

Events