Welcome!

Blog Feed Post

New Calix Solution Paves Way for CE 2.0 and LTE-Advanced Backhaul Services

Expanded Compass tools and E-Series nodes accelerate new revenue opportunities for service providers

PETALUMA, CA - January 29, 2014 - Calix, Inc. (NYSE: CALX) today announced a new solution for the delivery of Metro Ethernet Forum (MEF) Carrier Ethernet (CE) 2.0 services and LTE-Advanced mobile backhaul services by communications service providers. Composed of three main pillars, the solution is architected to address the emerging trends toward cloud-based and mobile work environments:

- Service Verify: A new Compass software application that allows service providers to stay one step ahead of their subscribers through proactive monitoring, management, and marketing of service level agreement (SLA) contracts and performance;
- The E5-308 and E5-520 Ethernet Service Access Nodes (ESANs): Two fixed form factor expansions to the E-Series line of access platforms and nodes that enable faster time-to-revenue from anywhere in the network for advanced business and mobile backhaul services; and
- Enhanced consulting services: New services that get CE 2.0 and LTE-Advanced backhaul services up and running quickly for service providers enabling new options that can transform their businesses.

This unique combination of software, systems, and services allows service providers to expand their portfolio and offer differentiated advanced business and mobile backhaul services to claim additional market share. Fully leveraging the efficiencies of a cloud-based software-as-a-service (SaaS) model, the Service Verify application brings new levels of granularity and flexibility to service providers looking to expand revenue streams and drive subscriber satisfaction through SLA contract monitoring and management. Coupled with Service Verify, the E5-520 and E5-308 ESANs are optimized for emerging CE 2.0 applications, with ultra-high bandwidth capacity, advanced traffic prioritization, and extensive deployment flexibility.

"Carrier Ethernet 2.0 services and advanced mobile backhaul services are crucial components of our growth plans as we expand our service offerings in our traditional service areas, as well as to adjacent areas through the Teton Broadband Project," Ron McCue, COO of Silver Star Communications. "Service Verify complements our existing Compass implementations and allows us to proactively monitor and manage our growing business and wholesale services at a new level. The new E5 nodes give us the broadband capacity and features we need to grow our business service offerings and stay ahead of demand, while also giving us the peace-of-mind that we have a network ready for mobile expansion."

Service Verify uses sophisticated predictive analysis techniques to give service providers advanced warning of business service and mobile backhaul circuits that are in danger of falling outside of SLA contractual commitments. This is invaluable in ensuring service performance for these high margin subscribers and building trust and subscriber satisfaction. Service Verify also provides a service portal for these subscribers, granting visibility for those who rely on the network the most. Combined with other Compass tools through Command Center to deliver one centralized subscriber view encompassing Calix and other third party devices, Service Verify software delivers a comprehensive and differentiated Ethernet service management experience.

A natural complement to Service Verify, the E5-520 and E5-308 ESANs offer state-of-the-art CE 2.0 and advanced timing support across multiple form factors and powering options. EXA Powered for rapid turn-up and provisioning, the new E5s create a network infrastructure that is agile, nimble, and responsive, enabling a faster time-to-revenue. The E5 nodes can also function individually or in complementary fashion as integrated service demarcation and aggregation switches in the network, creating powerful opportunities for CAPEX and OPEX efficiency by eliminating the need for box-on-box deployments.

The E5-520 and E5-308 ESANs also support:

  • Advanced Flow Classification for predictable Quality of Service
  • High-fidelity network timing for next-generation mobile backhaul service requirements
  • Four 10 gigabit Ethernet (GE) ports and 20 1GE SFP Ethernet ports (E5-520)
  • Four 1GE SFP Ethernet ports and four 1GE UTP RJ-45 Ethernet ports (E5-308)
  • Redundant and hot-swappable AC and DC powering options

"Business services and the backhaul of the growing number of small cells are two of the most strategic areas of opportunity for service providers to grow their revenues in the coming years," John Colvin, Calix senior vice president of North American sales. "With this in mind, Calix built Service Verify and the new E5 nodes to help service providers differentiate themselves in this competitive market and take advantage of new revenue possibilities. We believe this combined solution of software, systems, and services will allow service providers to bring winning services to market quickly, stay ahead of emerging market requirements, and accelerate their business transformation by expanding their presence in the business and wholesale markets."

About Calix
Calix (NYSE: CALX) is a global leader in access innovation. Its Unified Access portfolio of broadband communications access systems and software enables communications service providers worldwide to transform their networks and become the broadband provider of choice to their subscribers. For more information, visit the Calix website at www.calix.com.

This press release may contain forward-looking statements that are based upon management's current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting the Company's business. The reader is cautioned not to unduly rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix's results and other risks and uncertainties are detailed in its reports on Form 10-Q for the third 2013 fiscal quarter and Annual Report on Form 10-K for the fiscal year 2012, filed with the SEC and available at http://www.sec.gov/.

Press Inquiries:
Neila Matheny
707-766-3512
Neila.matheny@calix.com

Press Inquiries (International):
Brian Dolby
Proactive PR
+44 (0)7899 914168
brian.dolby@proactive-pr.com

Sheila Lashford
Proactive PR
+44 (0) 7986 514240
sheila.lashford@proactive-pr.com

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

Latest Stories
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
Tricky charts and visually deceptive graphs often make a case for the impact IT performance has on business. The debate isn't around the obvious; of course, IT performance metrics like website load time influence business metrics such as conversions and revenue. Rather, this presentation will explore various data analysis concepts to understand how, and how not to, assert such correlations. In his session at 20th Cloud Expo, Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Sys...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
SYS-CON Events announced today that Enzu will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive ad...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.