|By Business Wire||
|February 24, 2014 03:05 AM EST||
MOBILE WORLD CONGRESS – Wind River®, a world leader in delivering software for intelligent connected systems, has introduced Wind River Carrier Grade Communications Server, the industry’s first commercial carrier grade fully integrated and virtualized software platform. The solution is designed specifically for network functions virtualization (NFV) deployment and seamlessly integrates with existing networks.
“Carrier networks are evolving toward full virtualization of function, and central to this transformation is a platform that allows easy virtualization of applications while maintaining the core attributes of a carrier grade solution: availability, scalability, security and management,” said Mike Langlois, general manager of the communications business for Wind River. “While many companies supplying enterprise IT solutions may claim they offer an NFV solution, without the ability to deliver on carrier grade, those products are not a true fit to successfully achieve NFV. Carrier grade has long been part of Wind River’s DNA.”
A complete NFV solution, Wind River Carrier Grade Communications Server will enable operators to migrate their networks to NFV architectures while maintaining the carrier grade attributes they are known for. Customers can onboard and deploy NFV applications right out of the box, giving them a competitive jump-start in becoming NFV-ready.
Developed by telecom experts, Wind River Carrier Grade Communications Server is based on Wind River Open Virtualization with Wind River Linux, optimized real-time Kernel-Based Virtual Machine (KVM++), carrier grade enhancements to OpenStack®, and Intel® Data Plane Development Kit (Intel DPDK) accelerated vSwitch technologies.
A hard requirement for telecommunications, carrier grade is essential for operators and service providers as they cannot deploy applications unless they can do the following:
- Maintain existing five “five 9s” or “six 9s” (99.999 to 99.9999%) reliability, translating to downtime as low as 30 seconds a year
- Manage applications through their existing OSS/BSS/NMS systems
- Provide significant scalability, especially as new device categories get attached to the network as part of the Internet of Things
- Achieve the service level agreement (SLA) performance and security requirements they already guarantee their customers today with non-virtualized applications
A key value of NFV is the ability to run what used to be dedicated boxes on virtual machines on commercial off-the-shelf (COTS) hardware. Wind River Carrier Grade Communications Server is optimized for and running on HP ProLiant servers and Intel® Xeon® processors for Communications Infrastructure Systems. Wind River is also working with HP to certify Wind River communications software on Network Equipment Building System (NEBS)-compliant HP ProLiant servers.
Embracing standards and openness, Wind River is a contributing member of the ETSI NFV Industry Standards Group, and has been actively working with leading telecom equipment companies and service providers on NFV and cloud-based proof-of-concepts over the past few years. Prior to the formalization of the NFV Industry Standards Group, Wind River was a key contributor to the early-stage NFV proof-of-concepts initiative by BT.
Wind River Carrier Grade Communications Server is available in Q1 2014 as an early access release for select customers. To learn more about Wind River Carrier Grade Communications Server and how Wind River is addressing the opportunities and challenges created by NFV and network transformation, visit http://www.windriver.com/announces/network-functions-virtualization/.
Wind River is showcasing its Wind River Carrier Grade Communications Server at the Wind River booth in Hall 7, Stand 7J65 at Mobile World Congress. To learn more about Wind River at Mobile World Congress, visit http://www.windriver.com/events/mobile-world-congress-2014/.
About Wind River
Wind River, a wholly owned subsidiary of Intel Corporation (NASDAQ: INTC), is a world leader in delivering software for intelligent connected systems. The company has been pioneering computing inside embedded devices since 1981, and its technology is found in more than 1 billion products. Wind River offers the industry's most comprehensive embedded software portfolio, supported by world-class global professional services and support, and a broad partner ecosystem. Wind River delivers the technology and expertise that enables the innovation and deployment of safe, secure, and reliable intelligent systems. To learn more, visit Wind River at www.windriver.com.
Wind River is a trademark or registered trademark of Wind River Systems, Inc. and its affiliates. Intel and Xeon are registered trademarks of Intel Corporation in the United States and other countries. Other names and brands may be claimed as the property of others.
“One of the key drivers behind network transformation is the adoption of
COTS-based hardware designed to help operators reduce total cost of
ownership and shorten the time needed to upgrade or deploy new services.
Wind River Carrier Grade Communications Server was designed to run on HP
servers and has been pre-tested, validated and supported on a number of
HP platforms created specifically for telecom and NFV applications. This
joint effort will help customers embrace an NFV environment that
provides the flexibility needed to keep quality and cost in check.”
- Werner Schaefer, Vice President, Network Functions Virtualization, HP
“The technical contributions by Wind River to BT’s network evolution
research were highly valuable and the results achieved helped to
crystalize BT’s NFV thinking. Wind River understands the Carrier Grade
environment, and their expertise played a significant role in the
success of our NFV proof-of-concept prototypes. Our open collaboration
with Wind River and other technology leaders has clearly demonstrated to
the industry that the promise of NFV can be realized.”
- Don Clarke, Head of Network Evolution Innovation, BT
“NFV plays a key role in our effort to transform networks into open,
virtualized, standards-based architectures. The Wind River Carrier Grade
Communications Server employs key technologies consistent with the Intel
Open Network Platform Server Reference Design such as Intel DPDK and
OpenStack. Wind River has the telecommunications expertise to help our
customers and ISV partners deliver outstanding solutions for SDN and
NFV. Their technology demonstrates a powerful, high performance and
flexible element to building the next generation of open,
- Rose Schooler, Vice President and General Manager, Intel Communications and Storage Infrastructure Group
“The telecommunications industry is changing to tap the potential of
cloud environments and network functions virtualization, and
increasingly looking to open infrastructures and standards in order to
achieve this. As a long time champion for Linux innovation and
instrumental supporter for the Yocto Project, Wind River plays a key
role in helping the open source community and telecommunications
industry achieve new levels of innovation.”
- Mike Woster, Chief Operating Officer, The Linux Foundation
The telecommunications network is at the start of a major
transformation. The industry is looking towards NFV to enable service
providers to transform their networks to quickly deliver new services
and reduce costs. Service agility is key. The migration to NFV requires
telecom specific virtualization software to deliver real time traffic,
scale to hundreds of millions of users, and support high reliability.
Wind River has the telecommunications and carrier grade expertise to
help companies move towards NFV and address the challenges of a changing
- Lee Doyle, Principal Analyst, Doyle Research
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 6, 2016 06:15 PM EDT Reads: 1,423
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
May. 6, 2016 06:00 PM EDT Reads: 297
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 6, 2016 06:00 PM EDT Reads: 1,253
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 6, 2016 06:00 PM EDT Reads: 856
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 6, 2016 05:30 PM EDT Reads: 837
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
May. 6, 2016 05:00 PM EDT Reads: 324
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
May. 6, 2016 05:00 PM EDT Reads: 313
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 6, 2016 04:00 PM EDT Reads: 873
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 6, 2016 04:00 PM EDT Reads: 1,212
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
May. 6, 2016 03:15 PM EDT Reads: 263
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 6, 2016 03:00 PM EDT Reads: 304
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
May. 6, 2016 02:15 PM EDT Reads: 914
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 6, 2016 01:45 PM EDT Reads: 1,375
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 6, 2016 01:00 PM EDT Reads: 1,417
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 6, 2016 12:45 PM EDT Reads: 1,190