How a modern data stack is unlocking agility across the retail industry

In today’s shop-from-anywhere world, the model for success continues to change. Tried and true techniques are becoming obsolete as consumer expectations evolve, demand volatility rises, and supply chain disruptions become more frequent. Retailers are also dealing with online shopping surges that add new complexities to existing data strategies due to an influx of raw, unprepped, and largely underutilized data.

Spotlight

Ansys

For more than 50 years, Ansys software has enabled innovators across industries to push boundaries with the predictive power of simulation. From sustainable transportation and advanced semiconductors, to satellite systems and life-saving medical devices, the next great leaps in human advancement will be powered by Ansys.

OTHER ARTICLES
Enterprise Mobility, Mobile Infrastructure

As 5G growth accelerates, CSPs have new opportunities for network differentiation and service growth

Article | June 16, 2023

Despite the COVID-induced interruptions in the first half of 2020, 5G preparations and deployment continued in earnest in the second half of 2020 and now the market – vendors, CSPS, OEMs – are ready to bring 5G to the masses of users. The arrival of Apple’s first 5G devices in 4Q20 marked the tipping point of global consumer readiness, now extending from early-adopters. After the initial phase of network launches that saw coverage built-out in major urban centres, 5G service providers should now focus on expanding coverage to as many areas of high-data demand as possible. At the same time, as CSPs gauge their 5G roll-out strategies, they shouldn’t ignore rural areas with limited-to-no high-speed broadband coverage. In many markets, particularly developing ones, CSPs should carefully assess network-sharing as a way to cost-effectively tap pent-up demand, especially given the accelerating remote working trend.

Read More
Network Infrastructure, Network Management

Why Should You Choose an Added Protection Layer with a VPN?

Article | July 10, 2023

There was a time when network security meant having servers on-site. A firewall would protect company data whenever internet traffic entered and exited the network. But, what about today? Modern businesses do not strictly function on-premise. With the COVID-19 pandemic, the number of people working off-site part-time or full-time increased enormously – and suddenly. This change compelled cybersecurity professionals to reconsider their security measures. Their online privacy solutions had to ensure that their most precious asset — their data — was secure regardless of where workers accessed it. Even when restrictions are lifted, businesses continue to use remote teams. As a result, more and more of a company's critical data and services are being housed in the cloud. These two criteria indicate that the need to examine network security on a regular basis is here to stay. The good news is that a VPN, or virtual private network, is one of the most simple and widely accessible network security solutions for remote worker internet access. Do VPNs Provide Reliable Business Security? A virtual private network is a kind of Internet security service that enables users to connect to the internet as if they were on a private network. VPNs utilize encryption to provide a secure connection across vulnerable Internet infrastructure. VPNs are one method for protecting business data and controlling user access to that data. The VPNs safeguard data as users interact with applications and websites through the Internet, and they can conceal specific resources. They are typically used for access control, although alternative identity and access management (IAM) systems can also assist with user access management. VPN Encryption Enhances Network Security Data is encrypted so that only authorized parties can view it. Anyone who manages to intercept it, whether a hacker, a fraudster, or another bad actor, is out of luck. Imagine an employee is working from a coffeehouse, shared workspace, hotel, or airport and has access to your company's business-grade VPN. (Please keep in mind that business-or enterprise-grade VPNs are not the same as free VPN services.) The employee can create an encrypted connection between both the user's device and your VPN by using a VPN client installed on their preferred device and a public Wi-Fi network. This device, as well as any others that connect to your VPN, will establish encryption keys on both sides of the network connection. These keys will then encrypt and decrypt the information being exchanged. The data of the person working at the coffeehouse is secured by the VPN after they create an encrypted VPN connection by utilizing the coffeehouse's Wi-Fi as a hotspot with a VPN client. Even if cybercriminals get access to the network of that coffeehouse, your employees and their data are secure within the VPN tunnel. Closing Lines Network security requires a VPN service from a trustworthy VPN provider. Our next-generation VPN enables enterprises to fully protect their assets in a dynamic, cost-effective, and scalable manner. A VPN solution enables you to connect private networks, devices, and servers quickly and simply to create a secure, virtualized, modern internet.

Read More
Enterprise Mobility

Why Security Vulnerability Assessments Are Necessary?

Article | June 15, 2023

Cybercrimes have increasingly become a matter of concern for companies worldwide. Over the past few years, the rise of big-ticket ransomware attacks and exposure of perilous software supply chain infections has awakened organizations to various digital dangers. So, the big question is, how to combat the security threats that are on meteoric growth? The best solution is to adopt a security vulnerability assessment. What is Security Vulnerability Assessment? A vulnerability assessment involves a systematic review of security hazards, which helps identify IT infrastructure’s weaknesses, risks, and vulnerabilities. When it comes to mitigating vulnerabilities and resolving issues, the collective imperative is to analyze the problem areas before getting them fixed. A security assessment is critically important to combat the complexities and with an effective vulnerability assessment program, organizations use the tools required to comprehend the probable security weaknesses and enable the protection of systems and data from intruders and unauthorized breaches. For most organizations, ensuring the safety of devices, networks, applications, and digital assets are part of a broader vulnerability management strategy. It includes an extensive assessment, in-depth processes, and mitigation methods to explore the entire threat spectrum. Typically, it is conducted regularly. Vulnerability assessment offers a firm assurance in the security of data, especially when some alterations have been implemented or a new service has been added, or, for that matter, and installation of new equipment has taken place. Each assessment provides a perspective about the risk in its periphery and suggests solutions to control the risk factors and the evolving threats. Why Security Vulnerability Assessment Is Necessary? The perpetual threat of cybercrime has necessitated the demand for vulnerability assessments significantly. They make organizations realize their security defects and contribute towards mitigating them. Hackers are forever ready to make phishing attacks. As per reports, hackers are at work every 39 seconds. Thus, it is extremely important to be vigilant or complacent to activate hackers’ and cybercriminals’ machinations. Over the period, cybercrimes are fluctuating and thus need ongoing attention. The ideal solution is to undertake consistent vulnerability assessments to safeguard confidential data, systems, and networks. Furthermore, it helps organizations understand the risk and enables smart decision-making. To ensure security, companies ought to conduct both external and internal scans of their networks. According to Gartner (paywall), “Large organizations with thousands of employees, tens of thousands of servers and many operating systems receive hundreds of requests per year to patch thousands of vulnerabilities that cannot be remediated in less than 15 days.” One of the best reasons security vulnerability assessments are important is because it confirms an enterprise’s management processes and whether it has covered every critical patch through outlined existing remediation. Why Do Companies Need Vulnerability Assessment? A vulnerability assessment provides companies insightful details on all types of security discrepancies in their environment. It paves ways to evaluate the risks associated with the flaws. This helps organizations have a better knowledge of their security scare, overall weaknesses, and assets. Moreover, the first thing that strikes us on hearing about a cyber-attack is the security of data. With the right and adequate implementation of security assessments, the safety and security of important data could be easily protected. A security assessment would be helpful to reduce irrelevant expenses and make space and increase the IT budget to invest in other key aspects. Undoubtedly, data breach causes substantial loss to an organization, which leads to legal hassles and financial hazards. In fact, most of the time companies fail to recover the loss. Thus, it doesn’t harm to place solid policies and methods to strengthen the entire security position of the organization and this can only be possible with a strategic security vulnerability assessment. In a nutshell, this would keep the companies aware and, in all likelihood, keep the cyber-criminals at bay. A CASE STUDY ANALYSIS To cite an example, let’s take how Zensar conducted a three-pronged vulnerability assessment with port scan and penetration scanning. It determined the security of its offerings to meet customer requests for Brainshark, a leading provider of on-demand presentation solutions, helping customers deliver business interaction across 600+ ranking companies in the market. While Brainshark knew their systems were secure and could also establish it through their documentation, they still undertook a third-party security vulnerability assessment. Zensar’s vulnerability assessment procedures were based on the industry’s best practices that included tests for SQL injection, cookie manipulation, access control weakness, session state, and cross-site scripting. The focus of the test was to identify the host and application security concerns. Upon completing the tests and assessments, Brainshark expressed satisfaction and was confident enough in their ability and solution. They knew their security posture was highly protected and secure. Types of Vulnerability Assessments: Vulnerability assessments unearth a variety of system and network vulnerabilities. This indicates the reliability of the assessment process, which is implemented with different tools, scanners, and methods that helps discover the vulnerabilities, risks, and threats. Network-based assessment scanning: It is used to determine the presumptive network security attacks. This kind of scanning can also detect the vulnerable systems on wired as well as wireless networks. Host-based scans: It is easy to locate the vulnerabilities in servers or other network hosts with host-based scanning. This type of scanning provides visibility into the configuration settings and legacy systems. Database scans: Database scans ascertain the weak points in a database to preclude malefic attacks. Application Scans: It examines websites to identify and recognize software vulnerabilities and inaccurate configurations in network or web applications. Summing Up Organizations need to be watchful every minute and ensure the security posture is rigorous, which is only possible with security vulnerability assessments. Based on this criterion, understanding company risks gets simplified in turn preventing intrusions and threats. FREQUENTLY ASKED QUESTIONS What Are the Advantages of Security Vulnerability Assessment? There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks. What Are the Disadvantages of Security Vulnerability Assessment? While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What Are the Advantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks." } },{ "@type": "Question", "name": "What Are the Disadvantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too." } }] }

Read More

Connecting the Unconnected, RuralStar Brings Digital Life to Everyone

Article | June 30, 2021

When you're immersed in ultra-fast 5G amazing services, 600 million people around the world are still blocked from accessing mobile networks. When you experience seamless online shopping and online education, 3.4 billion people worldwide have not experienced mobile Internet services. On the road where connections are not connected, no one will be left behind. We can feel the life changes by RuralStar deployment.

Read More

Spotlight

Ansys

For more than 50 years, Ansys software has enabled innovators across industries to push boundaries with the predictive power of simulation. From sustainable transportation and advanced semiconductors, to satellite systems and life-saving medical devices, the next great leaps in human advancement will be powered by Ansys.

Related News

Network Infrastructure

NTT DATA and IP Infusion Partner to Accelerate Network Disaggregation

Business Wire | October 17, 2023

IP Infusion, a leading provider of open network software and solutions for wireline and mobile network operators, today announced a strategic partnership with NTT DATA, a global digital business and IT services leader. NTT DATA and IP Infusion are collaborating for go-to-market open networking solutions to bring enhanced disaggregation, scalability, and choices to network operators. NTT DATA (part of NTT Group) is a global innovator of IT and business services headquartered in Tokyo that offers consulting, industry solutions, business process services, IT modernization and managed services. NTT DATA will offer IP Infusion Cell Site Routers, Routed Optical Networking, Aggregation Router and Data Center software products, including bundled solutions, on a broad portfolio of white box hardware. This collaboration for expanding broad connectivity was initiated by the Telecom Infra Project (TIP), including TIP solutions for Disaggregated Cell Site Gateways (DCSG) or Cell Site Routers and Cassini for Routed Optical Networking projects. Both NTT DATA and IP Infusion are members of TIP, which is driving development and deployment of open, disaggregated, and standards-based technology solutions to advance global connectivity. “We are deeply committed to accelerating network disaggregation throughout our global ecosystem of customers and partners,” said Teodoro López Palacios, Partner, Telecom Sector at NTT DATA Europe & LATAM. “IP Infusion is a proven leader in open networking, providing award-winning and field-tested solutions that reduce total cost of ownership while expanding services. We are excited to help propel innovation, greater access, and better network outcomes to more users.” “The systems integrator role is important for the TIP community, and the IP Infusion and NTT DATA alliance is a big step forward for bringing disaggregated solutions to a diverse range of use cases,” said Kristian Toivo, Executive Director of Telecom Infra Project. “NTT DATA and IP Infusion have long demonstrated deep expertise in open network solutions and this collaboration will help create a stronger, more flexible supply chain, supporting high-quality connectivity.” We are pleased to partner with NTT DATA to drive further market penetration for open networking, said Atsushi Ogata, President and CEO of IP Infusion. It’s great to be working with NTT DATA, a trusted global innovator for business IT solutions, which clearly understands the powerful potential of network disaggregation. We are proud to be furthering TIP’s ideals for expanding open networks and paving the way for a connected future. Along with this partnership with NTT DATA, IP Infusion continues to receive acclaim for its products and services. This spring, leading independent global provider of technology industry insights GigaOm designated IP Infusion as Leader and Outperformer for the third consecutive year in all three of its 2023 Network Operating System Radar Reports. The IP Infusion software platform was identified as the most complete of the more than 20 NOS vendors GigaOm analysts evaluated, outperforming incumbent providers including Cisco and Juniper. In addition, TIP recognized IP Infusion’s Disaggregated Cell Site Gateway (DCSG) solution with the TIP Validated Solution Gold Badge in 2022. IP Infusion’s software was recognized for satisfying the stringent requirements set by the TIP Open Optical Packet Transport Project (OOPT) group for the DCSG. About IP Infusion IP Infusion manufactures open network software and solutions for carriers, service providers and data centers. With hundreds of customers and thousands of deployments, IP Infusion is a market leader in Network Operating Systems. Our flagship software platform OcNOS® allows network operators to disaggregate their networks, streamline operations, and reduce Total Cost of Ownership (TCO). Network OEMs may also disaggregate network devices to expedite time to market, offer comprehensive services, and achieve carrier grade robustness. IP Infusion is headquartered in Santa Clara, Calif., and is a wholly owned and independently operated subsidiary of ACCESS CO., LTD. Additional information can be found at http://www.IPInfusion.com. IP Infusion and OcNOS are trademarks or registered trademarks of IP Infusion. ACCESS is a registered trademark or trademark of ACCESS CO., LTD. in the United States, Japan and/or other countries. Northforge Innovations is a registered trademark of Northforge Innovations, Inc. All other trademarks, service marks, registered trademarks, or registered service marks mentioned are the property of their respective owners.

Read More

Data Center Networking

NV5 Acquires AT Advanced Technologies, Strengthening Data Center Commissioning and Mission Critical Services

NV5 | December 29, 2021

NV5 Global, Inc. (the “Company” or “NV5”) (Nasdaq: NVEE), a provider of compliance, technology, engineering, and environmental consulting solutions, announced that it has acquired AT Advanced Technologies Asia Pacific Pte. Ltd. (AT), an international consulting firm providing commissioning management and engineering services for high tech facilities and data centers. AT’s clients include large international technology and financial companies that depend on the efficiency and reliability of mission-critical data centers for their day-to-day operations. The acquisition was made with a combination of cash and stock and will be immediately accretive to NV5’s earnings. “Data center commissioning and mission critical engineering is a high-margin, high-growth sector that NV5 entered in early 2021 with the successful acquisition of Industrial Design Associates International,Singapore is one of the largest and fastest growing data center markets in the world, and AT Advanced Technologies’ give us a competitive edge in capitalizing on data center market growth in Singapore and throughout Southeast Asia.” -Dickerson Wright, PE, Chairman & CEO of NV5. Founded in 1999, AT has completed more than 350 projects in Asia and Australia and operates out of three offices in Singapore, Hong Kong, and India. “We are excited to join NV5 and the acquisition strengthens our existing platform for further expansion,” said Victor John Carey, CEO and Founder at AT Advanced Technologies. “AT Advanced Technologies complements our energy efficiency and building analytics services and expands our international commissioning capabilities. We look forward to presenting our combined capabilities to existing customers and new client pursuits,” - Gary Hui, PE, Vice President of NV5 Energy Efficiency and Mission Critical Services. About AT Advanced Technologies AT Advanced Technologies is a building services engineering, commissioning management, and energy management consulting firm providing clients with integrated skills and expertise to match the expectation of blue chip multi-national companies. With a unique blend of qualified technical staff from the UK, Australia, Singapore, and various countries in South East Asia, AT Advanced Technologies delivers world class services to clients in the financial and technology markets. AT Advanced Technologies is a member of the USGBC (LEED), the Commissioning Specialists Association (CSA) and is bizSAFE Star certified. About NV5 NV5 Global, Inc. (NASDAQ: NVEE) is a provider of compliance, technology, engineering, and environmental consulting solutions for public and private sector clients supporting sustainable infrastructure, utility, and building assets and systems. The Company focuses on multiple verticals: testing, inspection & consulting, infrastructure, utility services, buildings & program management, environmental health sciences, and geospatial technology services to deliver innovative, sustainable solutions to complex issues and improve lives in our communities. NV5 operates out of more than 100 offices nationwide and abroad. For additional information, please visit the Company’s website at www.NV5.com. Also visit the Company on LinkedIn, Twitter, Facebook, and Instagram.

Read More

Network Infrastructure

Broadcom Empowers Meta’s Data Center Network Fabric With World’s Highest Bandwidth Ethernet Switch Chip

Broadcom | November 10, 2021

Broadcom Inc. (NASDAQ:AVGO) announced that Meta is now deploying the world’s highest bandwidth Ethernet switch chip, the Broadcom StrataXGS® Tomahawk® 4 switch series, in its data center network fabric. A leading-edge 25.6 Tbps Ethernet switch, the Tomahawk4 is now shipping in high volume in Meta’s Minipack2 platform— an industry first. “Broadcom is pleased to support Meta and its ecosystem partners on the transition to a leading-edge 25.6Tbps networking fabric, Our multi-year collaborative effort has resulted in the successful integration of multiple generations of the marketplace’s highest bandwidth Tomahawk switch chip into Meta’s industry- leading Wedge400 and Minipack2 networking platforms.” -Ram Velaga, senior vice president and general manager, Core Switching Group, Broadcom The Tomahawk family has consistently led the market in switching bandwidth. This has continued with the Tomahawk4 family shipping in volume for over one year, remaining the only 25.6Tbps solution in production today. Members of the Tomahawk4 family, currently in production, include the Tomahawk4-50G, Tomahawk4-100G and Tomahawk4-12.8T. The Tomahawk4 switch series provides the world’s lowest power per bit of throughput, enabling significant savings in operational expense and allowing for ultra-high density network equipment. The variety of SerDes speeds and bandwidth points provided by the Tomahawk4 devices, enable direct connection to high-volume 200Gbps, 400Gbps, and 800Gbps optics. The Broadcom Tomahawk3, the Tomahawk4’s predecessor, has been shipping in production since 2018. It has been deployed in Meta’s previous and current generation platforms. The Tomahawk4 and Tomahawk3 are the foundation of numerous hyperscale data center fabrics worldwide with a broad ecosystem of ODMs, OEMs, and Network Operating System partners. In addition to Tomahawk4, Minipack2 uses Broadcom’s 7nm Barchetta2, a 16×56-Gb/s full-duplex PHY, featuring demonstrated interoperability with Broadcom merchant switches and ASICs. This 400G/200G/100G retimer is designed with industry-leading 56-Gbps PAM4 Serdes architecture that supports greater than 30dB of insertion loss on both host and line interfaces. Ram Velaga, senior vice president and general manager, Broadcom, will join Omar Baldanado, director of Engineering, Meta, on stage at the 2021 Open Compute Project Global Summit in San Jose, California, to discuss the companies’ multi-collaborative efforts. The session titled, Networking and New Data Center Challenges- Presented by Meta,” will take place at 9:17a.m., SJCC- Concourse Level- Grand Ballroom 220. Availability Tomahawk 4, Tomahawk 3, and Barchetta2 are currently in high volume production. For more information on the Tomahawk switch series, Barchetta2, and all Broadcom products and solutions please click here. About Broadcom Broadcom Inc. (NASDAQ: AVGO) is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions. Broadcom’s category-leading product portfolio serves critical markets including data center, networking, enterprise software, broadband, wireless, storage and industrial. Our solutions include data center networking and storage, enterprise, mainframe and cyber security software focused on automation, monitoring and security, smartphone components, telecoms and factory automation. For more information, go to https://www.broadcom.com.

Read More

Network Infrastructure

NTT DATA and IP Infusion Partner to Accelerate Network Disaggregation

Business Wire | October 17, 2023

IP Infusion, a leading provider of open network software and solutions for wireline and mobile network operators, today announced a strategic partnership with NTT DATA, a global digital business and IT services leader. NTT DATA and IP Infusion are collaborating for go-to-market open networking solutions to bring enhanced disaggregation, scalability, and choices to network operators. NTT DATA (part of NTT Group) is a global innovator of IT and business services headquartered in Tokyo that offers consulting, industry solutions, business process services, IT modernization and managed services. NTT DATA will offer IP Infusion Cell Site Routers, Routed Optical Networking, Aggregation Router and Data Center software products, including bundled solutions, on a broad portfolio of white box hardware. This collaboration for expanding broad connectivity was initiated by the Telecom Infra Project (TIP), including TIP solutions for Disaggregated Cell Site Gateways (DCSG) or Cell Site Routers and Cassini for Routed Optical Networking projects. Both NTT DATA and IP Infusion are members of TIP, which is driving development and deployment of open, disaggregated, and standards-based technology solutions to advance global connectivity. “We are deeply committed to accelerating network disaggregation throughout our global ecosystem of customers and partners,” said Teodoro López Palacios, Partner, Telecom Sector at NTT DATA Europe & LATAM. “IP Infusion is a proven leader in open networking, providing award-winning and field-tested solutions that reduce total cost of ownership while expanding services. We are excited to help propel innovation, greater access, and better network outcomes to more users.” “The systems integrator role is important for the TIP community, and the IP Infusion and NTT DATA alliance is a big step forward for bringing disaggregated solutions to a diverse range of use cases,” said Kristian Toivo, Executive Director of Telecom Infra Project. “NTT DATA and IP Infusion have long demonstrated deep expertise in open network solutions and this collaboration will help create a stronger, more flexible supply chain, supporting high-quality connectivity.” We are pleased to partner with NTT DATA to drive further market penetration for open networking, said Atsushi Ogata, President and CEO of IP Infusion. It’s great to be working with NTT DATA, a trusted global innovator for business IT solutions, which clearly understands the powerful potential of network disaggregation. We are proud to be furthering TIP’s ideals for expanding open networks and paving the way for a connected future. Along with this partnership with NTT DATA, IP Infusion continues to receive acclaim for its products and services. This spring, leading independent global provider of technology industry insights GigaOm designated IP Infusion as Leader and Outperformer for the third consecutive year in all three of its 2023 Network Operating System Radar Reports. The IP Infusion software platform was identified as the most complete of the more than 20 NOS vendors GigaOm analysts evaluated, outperforming incumbent providers including Cisco and Juniper. In addition, TIP recognized IP Infusion’s Disaggregated Cell Site Gateway (DCSG) solution with the TIP Validated Solution Gold Badge in 2022. IP Infusion’s software was recognized for satisfying the stringent requirements set by the TIP Open Optical Packet Transport Project (OOPT) group for the DCSG. About IP Infusion IP Infusion manufactures open network software and solutions for carriers, service providers and data centers. With hundreds of customers and thousands of deployments, IP Infusion is a market leader in Network Operating Systems. Our flagship software platform OcNOS® allows network operators to disaggregate their networks, streamline operations, and reduce Total Cost of Ownership (TCO). Network OEMs may also disaggregate network devices to expedite time to market, offer comprehensive services, and achieve carrier grade robustness. IP Infusion is headquartered in Santa Clara, Calif., and is a wholly owned and independently operated subsidiary of ACCESS CO., LTD. Additional information can be found at http://www.IPInfusion.com. IP Infusion and OcNOS are trademarks or registered trademarks of IP Infusion. ACCESS is a registered trademark or trademark of ACCESS CO., LTD. in the United States, Japan and/or other countries. Northforge Innovations is a registered trademark of Northforge Innovations, Inc. All other trademarks, service marks, registered trademarks, or registered service marks mentioned are the property of their respective owners.

Read More

Data Center Networking

NV5 Acquires AT Advanced Technologies, Strengthening Data Center Commissioning and Mission Critical Services

NV5 | December 29, 2021

NV5 Global, Inc. (the “Company” or “NV5”) (Nasdaq: NVEE), a provider of compliance, technology, engineering, and environmental consulting solutions, announced that it has acquired AT Advanced Technologies Asia Pacific Pte. Ltd. (AT), an international consulting firm providing commissioning management and engineering services for high tech facilities and data centers. AT’s clients include large international technology and financial companies that depend on the efficiency and reliability of mission-critical data centers for their day-to-day operations. The acquisition was made with a combination of cash and stock and will be immediately accretive to NV5’s earnings. “Data center commissioning and mission critical engineering is a high-margin, high-growth sector that NV5 entered in early 2021 with the successful acquisition of Industrial Design Associates International,Singapore is one of the largest and fastest growing data center markets in the world, and AT Advanced Technologies’ give us a competitive edge in capitalizing on data center market growth in Singapore and throughout Southeast Asia.” -Dickerson Wright, PE, Chairman & CEO of NV5. Founded in 1999, AT has completed more than 350 projects in Asia and Australia and operates out of three offices in Singapore, Hong Kong, and India. “We are excited to join NV5 and the acquisition strengthens our existing platform for further expansion,” said Victor John Carey, CEO and Founder at AT Advanced Technologies. “AT Advanced Technologies complements our energy efficiency and building analytics services and expands our international commissioning capabilities. We look forward to presenting our combined capabilities to existing customers and new client pursuits,” - Gary Hui, PE, Vice President of NV5 Energy Efficiency and Mission Critical Services. About AT Advanced Technologies AT Advanced Technologies is a building services engineering, commissioning management, and energy management consulting firm providing clients with integrated skills and expertise to match the expectation of blue chip multi-national companies. With a unique blend of qualified technical staff from the UK, Australia, Singapore, and various countries in South East Asia, AT Advanced Technologies delivers world class services to clients in the financial and technology markets. AT Advanced Technologies is a member of the USGBC (LEED), the Commissioning Specialists Association (CSA) and is bizSAFE Star certified. About NV5 NV5 Global, Inc. (NASDAQ: NVEE) is a provider of compliance, technology, engineering, and environmental consulting solutions for public and private sector clients supporting sustainable infrastructure, utility, and building assets and systems. The Company focuses on multiple verticals: testing, inspection & consulting, infrastructure, utility services, buildings & program management, environmental health sciences, and geospatial technology services to deliver innovative, sustainable solutions to complex issues and improve lives in our communities. NV5 operates out of more than 100 offices nationwide and abroad. For additional information, please visit the Company’s website at www.NV5.com. Also visit the Company on LinkedIn, Twitter, Facebook, and Instagram.

Read More

Network Infrastructure

Broadcom Empowers Meta’s Data Center Network Fabric With World’s Highest Bandwidth Ethernet Switch Chip

Broadcom | November 10, 2021

Broadcom Inc. (NASDAQ:AVGO) announced that Meta is now deploying the world’s highest bandwidth Ethernet switch chip, the Broadcom StrataXGS® Tomahawk® 4 switch series, in its data center network fabric. A leading-edge 25.6 Tbps Ethernet switch, the Tomahawk4 is now shipping in high volume in Meta’s Minipack2 platform— an industry first. “Broadcom is pleased to support Meta and its ecosystem partners on the transition to a leading-edge 25.6Tbps networking fabric, Our multi-year collaborative effort has resulted in the successful integration of multiple generations of the marketplace’s highest bandwidth Tomahawk switch chip into Meta’s industry- leading Wedge400 and Minipack2 networking platforms.” -Ram Velaga, senior vice president and general manager, Core Switching Group, Broadcom The Tomahawk family has consistently led the market in switching bandwidth. This has continued with the Tomahawk4 family shipping in volume for over one year, remaining the only 25.6Tbps solution in production today. Members of the Tomahawk4 family, currently in production, include the Tomahawk4-50G, Tomahawk4-100G and Tomahawk4-12.8T. The Tomahawk4 switch series provides the world’s lowest power per bit of throughput, enabling significant savings in operational expense and allowing for ultra-high density network equipment. The variety of SerDes speeds and bandwidth points provided by the Tomahawk4 devices, enable direct connection to high-volume 200Gbps, 400Gbps, and 800Gbps optics. The Broadcom Tomahawk3, the Tomahawk4’s predecessor, has been shipping in production since 2018. It has been deployed in Meta’s previous and current generation platforms. The Tomahawk4 and Tomahawk3 are the foundation of numerous hyperscale data center fabrics worldwide with a broad ecosystem of ODMs, OEMs, and Network Operating System partners. In addition to Tomahawk4, Minipack2 uses Broadcom’s 7nm Barchetta2, a 16×56-Gb/s full-duplex PHY, featuring demonstrated interoperability with Broadcom merchant switches and ASICs. This 400G/200G/100G retimer is designed with industry-leading 56-Gbps PAM4 Serdes architecture that supports greater than 30dB of insertion loss on both host and line interfaces. Ram Velaga, senior vice president and general manager, Broadcom, will join Omar Baldanado, director of Engineering, Meta, on stage at the 2021 Open Compute Project Global Summit in San Jose, California, to discuss the companies’ multi-collaborative efforts. The session titled, Networking and New Data Center Challenges- Presented by Meta,” will take place at 9:17a.m., SJCC- Concourse Level- Grand Ballroom 220. Availability Tomahawk 4, Tomahawk 3, and Barchetta2 are currently in high volume production. For more information on the Tomahawk switch series, Barchetta2, and all Broadcom products and solutions please click here. About Broadcom Broadcom Inc. (NASDAQ: AVGO) is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions. Broadcom’s category-leading product portfolio serves critical markets including data center, networking, enterprise software, broadband, wireless, storage and industrial. Our solutions include data center networking and storage, enterprise, mainframe and cyber security software focused on automation, monitoring and security, smartphone components, telecoms and factory automation. For more information, go to https://www.broadcom.com.

Read More

Events