Welcome!

Blog Feed Post

New Calix Solution Paves Way for CE 2.0 and LTE-Advanced Backhaul Services

Expanded Compass tools and E-Series nodes accelerate new revenue opportunities for service providers

PETALUMA, CA - January 29, 2014 - Calix, Inc. (NYSE: CALX) today announced a new solution for the delivery of Metro Ethernet Forum (MEF) Carrier Ethernet (CE) 2.0 services and LTE-Advanced mobile backhaul services by communications service providers. Composed of three main pillars, the solution is architected to address the emerging trends toward cloud-based and mobile work environments:

- Service Verify: A new Compass software application that allows service providers to stay one step ahead of their subscribers through proactive monitoring, management, and marketing of service level agreement (SLA) contracts and performance;
- The E5-308 and E5-520 Ethernet Service Access Nodes (ESANs): Two fixed form factor expansions to the E-Series line of access platforms and nodes that enable faster time-to-revenue from anywhere in the network for advanced business and mobile backhaul services; and
- Enhanced consulting services: New services that get CE 2.0 and LTE-Advanced backhaul services up and running quickly for service providers enabling new options that can transform their businesses.

This unique combination of software, systems, and services allows service providers to expand their portfolio and offer differentiated advanced business and mobile backhaul services to claim additional market share. Fully leveraging the efficiencies of a cloud-based software-as-a-service (SaaS) model, the Service Verify application brings new levels of granularity and flexibility to service providers looking to expand revenue streams and drive subscriber satisfaction through SLA contract monitoring and management. Coupled with Service Verify, the E5-520 and E5-308 ESANs are optimized for emerging CE 2.0 applications, with ultra-high bandwidth capacity, advanced traffic prioritization, and extensive deployment flexibility.

"Carrier Ethernet 2.0 services and advanced mobile backhaul services are crucial components of our growth plans as we expand our service offerings in our traditional service areas, as well as to adjacent areas through the Teton Broadband Project," Ron McCue, COO of Silver Star Communications. "Service Verify complements our existing Compass implementations and allows us to proactively monitor and manage our growing business and wholesale services at a new level. The new E5 nodes give us the broadband capacity and features we need to grow our business service offerings and stay ahead of demand, while also giving us the peace-of-mind that we have a network ready for mobile expansion."

Service Verify uses sophisticated predictive analysis techniques to give service providers advanced warning of business service and mobile backhaul circuits that are in danger of falling outside of SLA contractual commitments. This is invaluable in ensuring service performance for these high margin subscribers and building trust and subscriber satisfaction. Service Verify also provides a service portal for these subscribers, granting visibility for those who rely on the network the most. Combined with other Compass tools through Command Center to deliver one centralized subscriber view encompassing Calix and other third party devices, Service Verify software delivers a comprehensive and differentiated Ethernet service management experience.

A natural complement to Service Verify, the E5-520 and E5-308 ESANs offer state-of-the-art CE 2.0 and advanced timing support across multiple form factors and powering options. EXA Powered for rapid turn-up and provisioning, the new E5s create a network infrastructure that is agile, nimble, and responsive, enabling a faster time-to-revenue. The E5 nodes can also function individually or in complementary fashion as integrated service demarcation and aggregation switches in the network, creating powerful opportunities for CAPEX and OPEX efficiency by eliminating the need for box-on-box deployments.

The E5-520 and E5-308 ESANs also support:

  • Advanced Flow Classification for predictable Quality of Service
  • High-fidelity network timing for next-generation mobile backhaul service requirements
  • Four 10 gigabit Ethernet (GE) ports and 20 1GE SFP Ethernet ports (E5-520)
  • Four 1GE SFP Ethernet ports and four 1GE UTP RJ-45 Ethernet ports (E5-308)
  • Redundant and hot-swappable AC and DC powering options

"Business services and the backhaul of the growing number of small cells are two of the most strategic areas of opportunity for service providers to grow their revenues in the coming years," John Colvin, Calix senior vice president of North American sales. "With this in mind, Calix built Service Verify and the new E5 nodes to help service providers differentiate themselves in this competitive market and take advantage of new revenue possibilities. We believe this combined solution of software, systems, and services will allow service providers to bring winning services to market quickly, stay ahead of emerging market requirements, and accelerate their business transformation by expanding their presence in the business and wholesale markets."

About Calix
Calix (NYSE: CALX) is a global leader in access innovation. Its Unified Access portfolio of broadband communications access systems and software enables communications service providers worldwide to transform their networks and become the broadband provider of choice to their subscribers. For more information, visit the Calix website at www.calix.com.

This press release may contain forward-looking statements that are based upon management's current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting the Company's business. The reader is cautioned not to unduly rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix's results and other risks and uncertainties are detailed in its reports on Form 10-Q for the third 2013 fiscal quarter and Annual Report on Form 10-K for the fiscal year 2012, filed with the SEC and available at http://www.sec.gov/.

Press Inquiries:
Neila Matheny
707-766-3512
[email protected]

Press Inquiries (International):
Brian Dolby
Proactive PR
+44 (0)7899 914168
[email protected]

Sheila Lashford
Proactive PR
+44 (0) 7986 514240
[email protected]

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...