5G for the UK manufacturing sector

July 4, 2019

Digital Catapult would like to thank companies in the 5G Manufacturing Working Group for their contribution to the research for this paper. The Working Group’s objective is to identify the role of 5G and use cases in the digitalisation of the manufacturing sector in the UK.

Spotlight

Venafi

Venafi is the market-leading cybersecurity company that secures and protects the cryptographic keys and digital certificates every business and government depends on for secure communications, commerce, computing, and mobility.

OTHER WHITEPAPERS
news image

Networking for the unforeseeable future

whitePaper | December 30, 2021

IT leaders realize that an agile, open networking platform is crucial to offering the flexibility and performance the organization needs to enable new business models. For an optimized solution that scales to support all users and applications, SD-WAN combined with the power of big data, artificial intelligence for IT operations (AIOps) and actionable insights offers IT the deepest visibility and most granular control of their infrastructure to deliver excellent application experiences.

Read More
news image

NICT Beyond 5G/6G White Paper English version 2.0

whitePaper | June 22, 2022

The implementation of fifth generation mobile communication systems in society has been in full swing since around 2020. Mobile communication systems have evolved into a communication infrastructure (1G-3G) and a living infrastructure (4G), becoming an indispensable element in the lives of individuals. It has become a social infrastructure that connects not only people but also things like the Internet of Things (IoT).

Read More
news image

FortiGate Secure SD-WAN on Google Cloud Platform (GCP) Reference Architecture

whitePaper | December 25, 2019

The public cloud, often referred to as the cloud, is a popular model of cloud computing. Cloud service providers leverage the internet and make resources such as infrastructure, storage, and servers available for businesses. Third-party providers own and operate the shared physical hardware and offer it to companies based on their needs. This multi-tenant environment makes it easier to spread the infrastructure costs across a number of users. Companies around the globe are adopting the cloud to take advantage of core characteristics: Cost effectiveness. By using cloud infrastructure, customers do not need to spend large amounts of money on purchasing and maintaining equipment. This drastically reduces capital expenditure (CapEx) costs, saving companies the resources and time to invest in hardware, facilities, and utilities, or to build out a large data center to grow their business.

Read More
news image

Dell PowerScale: Network Design Considerations

whitePaper | April 25, 2022

This document provides design considerations for understanding, configuring, and troubleshooting Dell PowerScale scale-out NAS external networking. In a scale-out NAS environment, the overall network architecture must be configured to maximize the user experience. Many factors contribute to overall network performance. This document examines network architecture design and best practices, including factors such as latency, flow control, ICMP, MTU, jumbo frames, congestion, TCP/IP parameters, and IPv6.

Read More
news image

Accelerating High-Speed Networking with Intel® I/O Acceleration Technology

whitePaper | January 1, 2023

The emergence of multi-Gigabit Ethernet allows data centers to adapt to the increasing bandwidth requirements of enterprise IT. To take full advantage of this network capacity, data center managers must consider the impact of hightraffic volume on server resources. A compelling way of efficiently translating high bandwidth into increased throughput and enhanced quality of service is to take advantage of Intel® I/O Acceleration Technology (Intel® I/OAT), now available in the new Dual-Core and Quad-Core Intel® Xeon® processor-based server platforms. Intel I/OAT moves data more efficiently through these servers for fast, scalable, and reliable networking.

Read More
news image

NG.127 E2E Network Slicing Architecture

whitePaper | May 10, 2022

The purpose of this document is to emphasize necessity of cross-standardization collaboration to realize E2E Network Slicing Architecture designed from an End-to-End (E2E) perspective, spanning over different technical domains (e.g., device, access network, core network, transport network and network management system) and multiple vendors and to provide guidance on actions in each Standards Developing Organizations (SDOs) and open source projects.

Read More

Spotlight

Venafi

Venafi is the market-leading cybersecurity company that secures and protects the cryptographic keys and digital certificates every business and government depends on for secure communications, commerce, computing, and mobility.

Events