Wednesday, April 3, 2013

Level 3 Lands GSA Contract Valued at $285 Million

The U.S. General Services Administration (GSA) awarded a multiple year competitive contract known as GSA Region 4 Integrated Telecommunications Services (GRITS) II to Level 3 Communications.

The contract allows Level 3 to bid on and provide communications services to all federal agencies and organizations authorized to use GSA sources of supply and services in the region. The fixed price with economic price adjustment (EPA) contract has a total estimated potential value of up to approximately $285 million, which includes the four-year base term with six additional option years.

http://www.level3.com

40th Anniversary of First Cell Phone Call


Forty years ago today, Martin Cooper placed the first public telephone call using a portable cellular phone. At the time, Cooper was general manager of Motorola's Communications Systems Division. He made the first call to his rival at AT&T's Bell Labs from the streets of New York City. Cooper went on to become founder and CEO of ArrayComm, which offers technologies for boosting spectral efficiency.

http://www.arraycomm.com
http://dynallc.com/#/Martin_Cooper/

Tuesday, April 2, 2013

Alcatel-Lucent's Nuage Enables L2-L4 Data Center VPN Automation


Nuage Networks, an Alcatel-Lucent spin-in venture focused on software defined networking (SDN), made its debut with the introduction of a Virtualized Services Platform(VSP) software suite aimed at automating data center infrastructure.

The Nuage Virtualized Services Platform (VSP) software consists of three elements:

  • Virtualized Services Directory (VSD) -- it serves as a policy, business logic & analytics engine for the abstract definition of network services. Network administrators can define services using RESTful APIs to the VSD.
  • Virtualized Services Controller (VSC) -- an SDN controller for programming the network. It serves as the control plane of the data center network, maintaining a full per-tenant view of network and service topologies. Nuage is supporting OpenFlow.
  • Virtual Routing & Switching (VRS) -- provides event driven automation to connecting cloud services to VPNs.  VRS serves as a virtual endpoint for network services, enabling changes in the compute environment to trigger instantaneous policy-based responses in network connectivity.

Nuage Networks said the unique capability of its SDN controller is an ability to program L2-L4 network virtualization across thousands of tenant slices in a heterogeneous environment. Nuage will use standard IETF protocols, such as BGP, to peer with existing networks, allowing it to discover full network topology and reachability. It will use Openflow to distribute switching and routing information to hypervisors within the virtualized datacenter network.

Nuage has trials underway with France's SFR, Canada's TELUS, the University of Pittsburgh Medical Center, and UK cloud service provider Exponential-e.

Speaking at a launch event in Santa Clara, California, Alcatel-Lucent's Basil Alwan said the opportunity for Nuage extends beyond transforming the cloud data center, as the "end game" is really about extending cloud bursting end-to-end across the WAN. He coined a new acronym -- software defined virtual private networks (SDVPNs) -- as the means connecting SDN controllers in the data center with MPLS VPNs.

http://www.alcatel-lucent.com
http://www.nuagenetworks.net


  • Nuage is headed by Sunil Khandekar, who previously was VP of business development for Europe, Middle East, and Africa (EMEA), as well as VP of global product management for Alcatel Lucent’s IP Division.


NTT Com Selects Compass-EOS' Silicon-Photonic Routers

NTT Communications has selected Compass-EOS' new r10004 core-grade modular routers for use in its high-capacity transpacific network. The Compass-EOS routers are the world’s first direct silicon-to-photonics-based routers.

“We chose Compass-EOS routers to be used at the termination points of our transpacific high-capacity network, providing a vital link between North America and APAC,” said Dorian Kim, Vice President of IP Engineering at NTT Communications. “The high bandwidth and low power consumption, together with the modularity of the Compass-EOS router family fit well with our future vision and plans.”

“We are thrilled to have NTT Communications among the first production users of our r10004 routers,” said Gadi Bahat, CEO of Compass-EOS. “We look forward to working with them on their implementation in building simple, innovative networks that deliver better services to their customers.”

http://compass-eos.com/

Last month, Compass-EOS unveiled its radical silicon-to-photonics router that essentially leverages an on-chip optical mesh and electronics to route high-densities of 100GbE and 10GbE.

The company's silicon-to-photonics implementation, which it calls icPhotonics, simplifies router design by bringing the entire backplane on-chip, thereby enabling petabit-class scalability, significantly smaller footprint and power consumption, and easier implementation of software-defined networking capabilities.  The on–chip optical integration ensures QoS routing at high utilization rates and congestion-free multicast packet handling. Compass-EOS said it is also able to ensure maximum router protection from DDoS attacks at maximum capacity.

The company's first product, r10004, is a carrier-grade, modular platform offering 800 Gbps Capacity in a 6U enclosure.  It offers 2 x 100G ports or 20 x 10G ports with full Layer 3 routing functionality for core, peering or aggregation deployments.

Midokura's Network Virtualization Attracts $17 Million in Funding


Midokura, a start-up with offices in Tokyo, San Francisco and Barcelona, announced $17.3M in Series A funding for its network virtualization technology.

Midokura offers an overlay-based network virtualization technology that allows cloud users to provision virtual network devices, including virtual switches, routers, firewalls and load balancers. Virtual network devices can then be connected to virtual machines, as well as other virtual network devices to create complex network topologies.

Midokura said its solution can be fully distributed and can be scaled out incrementally as demand increases. With MidoNet, users can virtualize the network stack for popular cloud platforms and reduce associated costs of managing the network.

The round was led by Innovation Network Corporation of Japan (INCJ), a Japanese public-private partnership. Other investors who participated in the round include NTT Group’s Venture Fund: NTT Investment Partners, L.P. and NEC Group’s Venture Fund: Innovative Ventures Fund Investment L.P.

Midokura also named Dan Mihai Dumitriu as its CEO. Mihai is a co-founder and previously served as CTO. Fellow co-founder Tatsuya Kato, who had been serving as CEO, is now Chairman of the Board.

http://www.midokura.com

NetSocket Raises $9.2 Million for Expansion into SDN

NetSocket, a start-up based in Plano, Texas, raised $9.2 million in Series B funding for expansion of it network assurance expertise into SDN.

NetSocket currently offers a Cloud Experience Manager (CEM) that provides insight into network issues.


The funding round was led by new investor Venture Investors, with participation by existing investors Sevin Rosen Funds, Silver Creek Ventures and Trail Blazer Capital.

“NetSocket has been innovating in the Unified Communications (UC) service assurance solutions space, as evidenced by the traction generated from our recently announced expanded collaboration with Microsoft. NetSocket’s Cloud Experience Manager (CEM) now optimizes Microsoft Lync UC service management and user’s experience,” said John White, president and CEO of NetSocket. “We plan to apply that same innovation and focused vision to the SDN market which we expect to experience explosive growth this year.”

http://www.netsocket.com

Verizon Financial Network Delivers Low Latency for CME Group


The Verizon Financial Network is delivering low latency connection directly to New York metro financial markets from CME Group's data center in Aurora, Illinois. The CME Group Aurora data center is home to the CME Co-Location Services offering, which caters to more than 100 direct customers.

The ultra-low-latency round-trip route bypasses traditional area "data hotels."  Specifically, the new Aurora-to-Carteret, N.J., route offers very high speed transmissions with ultra-low latency as low as 14.997 milliseconds round-trip.  Verizon is using Ciena's 6500 Packet-Optical Platform.

http://www.verizon.com

IEEE Forms 4-Pair Power-over-Ethernet Group


The IEEE has established a new study group to consider initiating a formal project to standardize 4-pair Power over Ethernet (PoE).

A 4-pair Power over Ethernet implementation could provide greater than 25.5 Watts of power.

"The formation of this study group will allow collaboration on a proposal for the development of a 4-pair PoE standard, which would allow support of new PoE applications in the areas of IPTV, industrial Ethernet and more," said David Law, chair of the IEEE 802.3 Ethernet Working Group and distinguished engineer with HP Networking. "A 4-pair approach would result in increased efficiency, since the use of additional pairs results in lower channel resistance."

http://www.ieee.org

Chunghwa Telecom Appoints New Chairman and CEO


Taiwan's Chunghwa Telecom appointed Dr. Yen-Sung Lee as Chairman and CEO, replacing Dr. Shyue-Ching Lu who resigned from his position as Chairman and CEO due to personal reasons. In addition, Mr. Mu-Piao Shih was appointed President of the Company, succeeding Dr. Lee.

Dr. Yen-Sung Lee previously served as the President of Chunghwa Telecom since his appointment in 2012 and has worked at Chunghwa Telecom for 39 years. Prior to becoming President, he served as the Senior Executive Vice President in charge of the marketing and IT departments. Dr. Lee has been instrumental in the Company's ICT & cloud business development over the past several years with his extensive background in information and data engineering.

http://www.cht.com.tw

Reliance Companies Reach Fiber Sharing Deal


Reliance Jio Infocomm Ltd. and Reliance Communications reached a deal under which Reliance Jio Infocomm will share multiple fiber pairs on RCOM’s nationwide inter-city fiber optic network infrastructure.

As per the agreement, Reliance Communications will in turn have reciprocal access to optic fiber infrastructure to be built by Reliance Jio Infocomm in the future.

The deal, which was valued at approximately Rs. 1,200 crore (US$221 million), also represents a reconciliation between the Ambani brothers.

http://www.rcom.co.in

Monday, April 1, 2013

Cyber 3.0 - Where the Semantic Web and Cyber Meet

by John Trobough, President, Narus

The term “Cyber 3.0” has been used mostly in reference to the strategy described by U.S. Deputy Defense Secretary William Lynn at an RSA conference. In his Cyber 3.0 strategy, Lynn stresses a five-part plan as a comprehensive approach to protect critical assets. The plan involves equipping military networks with active defenses, ensuring civilian networks are adequately protected, and marshaling the nation’s technological and human resources to maintain its status in cyberspace.

Cyber 3.0 technologies will be the key to enable such protection, and is achieved when the semantic Web’s automated, continuous machine learning is applied to cybersecurity and surveillance.

Cyber 3.0 will be the foundation for a future in which machines drive decision-making. But Cyber 3.0’s ability to deliver greater visibility, control and context has far-reaching implications in our current, hyper-connected environment, where massive amounts of information move easily and quickly across people, locations, time, devices and networks. It is a world where human intervention and intelligence alone simply can’t sift through and analyze information fast enough. Indeed, arming cybersecurity organizations with the incisive intelligence afforded by this machine learning means cybersecurity incidents are identified and security policies are enforced before critical assets are compromised.

THE PERFECT STORM: CONFLUENCE OF HYPER-CONNECTIVITY, MOBILITY AND BIG DATA

In order to stress the full weight of the meaning of Cyber 3.0, it is important to first put the state of our networked world into perspective. We can start by stating categorically that the Internet is changing: Access, content, and application creation and consumption are growing exponentially.

From narrowband to broadband, from kilobits to gigabits, from talking people to talking things, our networked world is changing forever. Today, the Internet is hyper-connecting people who are now enjoying super-fast connectivity anywhere, anytime and via any device. They are always on and always on the move, roaming seamlessly from network to network. Mobile platforms and applications only extend this behavior. As people use a growing collection of devices to stay connected (i.e., laptops, tablets, smartphones, televisions), they change the way they work and collaborate, the way they socialize, the way they communicate, and the way they conduct business.

Add to this the sheer enormity of digital information and devices that now connect us: Cisco estimates that by 2015, the amount of data crossing the Internet every five minutes will be equivalent to the total size of all movies ever made, and that annual Internet traffic will reach a zettabyte — roughly 200 times the total size of all words ever spoken by humans2. On a similar note, the number of connected devices will explode in the next few years, reaching an astonishing 50 billion by 20203. By this time, connected devices could even outnumber connected people by a ratio of 6-to-14. This interconnectedness indeed presents a level of productivity and convenience never before seen, but it also tempts fate: the variety and number of endpoints — so difficult to manage and secure — invite cyber breaches, and their hyper-connectivity guarantees the spread of cyber incidents as well as a safe hiding place for malicious machines and individuals engaged in illegal, dangerous or otherwise unsavory activities.

CYBER 3.0

Cyber is nonetheless integral to our everyday lives. Anything we do in the cyber world can be effortlessly shifted across people, locations, devices and time. While on one hand, cyber is positioned to dramatically facilitate the process of knowledge discovery and sharing among people (increasing performance and productivity and enabling faster interaction), on the other, companies of all sizes must now secure terabytes and petabytes of data. That data enters and leaves enterprises at unprecedented rates, and is often stored and accessed from a range of locations, such as from smartphones and tablets, virtual servers, or the cloud.
On top of all this, all the aforementioned endpoints have their own security needs, and the cybersecurity challenge today lies in how to control, manage and secure large volumes of data in increasingly vulnerable and open environments. Specifically, cybersecurity organizations need answers to how they can:

• Ensure visibility by keeping pace with the unprecedented and unpredictable progression of new applications running in their networks

• Retain control by staying ahead of the bad guys (for a change), who breach cybersecurity perimeters to steal invaluable corporate information or harm critical assets

• Position themselves to better define and enforce security policies across every aspect of their network (elements, content and users) to ensure they are aligned with their mission and gain situational awareness

• Understand context and slash the investigation time and time-to-resolution of a security problem or cyber incident

Unfortunately, cybersecurity organizations are impeded from realizing any of these. This is because their current solutions require human intervention to manually correlate growing, disparate data and identify and manage all cyber threats. And human beings just don’t scale.

CYBER 3.0: THE ANSWER TO A NEW GENERATION OF CYBER CHALLENGES

Indeed, given the great velocity, volume and variety of data generated now, the cyber technologies that rely on manual processes and human intervention — which worked well in the past — no longer suffice to address cybersecurity organizations’ current and future pain points, which correlate directly with the aforementioned confluence of hyper-connectivity, mobility and big data. Rather, next-generation cyber technology that can deliver visibility, control and context despite this confluence is the only answer. This technology is achieved by applying machine learning to cybersecurity and surveillance, and is called Cyber 3.0.

In using Cyber 3.0, human intervention is largely removed from the operational lifecycle, and processes, including decision-making, are tackled by automation: Data is automatically captured, contextualized and fused at an atomic granularity by smart machines, which then automatically connect devices to information (extracted from data) and information to people, and then execute end-to-end operational workflows. Workflows are executed faster than ever, and results are more accurate than ever. More and more facts are presented to analysts, who will be called on only to make a final decision, rather than to sift through massive piles of data in search of hidden or counter-intuitive answers. And analysts are relieved from taking part in very lengthy investigation processes to understand the after-the-fact root cause.

In the future, semantic analysis and sentiment analysis will be implanted into high-powered machines to:

• Dissect and analyze data across disparate networks

• Extract information across distinct dimensions within those networks

• Fuse knowledge and provide contextualized and definite answers

• Continuously learn the dynamics of the data to ensure that analytics and data models are promptly refined in an automated fashion

• Compound previously captured information with new information to dynamically enrich models with discovered knowledge

Ultimately, cybersecurity organizations are able to better control their networks via situational awareness gained through a complete understanding of network activity and user behavior. This level of understanding is achieved by integrating data from three different planes: the network plane, the semantic plane and the user plane. The network plane mines traditional network elements like applications and protocols; the semantic plane extracts the content and relationships; and the user plane establishes information about the users. By applying machine learning and analytics to the dimensions extracted across these three planes, cybersecurity organizations have the visibility, context and control required to fulfill their missions and business objectives.

Visibility: Full situational awareness across hosts, services, applications, protocols and ports, traffic, content, relationships, and users to determine baselines and detect anomalies

Control: Alignment of networks, content and users with enterprise goals, ensuring information security and intellectual property protection

Context: Identification of relationships and connectivity among network elements, content and end users

Clearly, these three attributes are essential to keeping critical assets safe from cybersecurity incidents or breaches in security policy. However, achieving them in the face of constantly changing data that is spread across countless sources, networks and applications is no small task — and definitely out of reach for any principles or practices that rely even partly on human interference. Moreover, without visibility, control and context, one can never be sure what type of action to take.

Cyber 3.0 is not a mythical direction of what “could” happen. It’s the reality we will face as the Web grows, as new technologies are put into practice, and as access to more and more devices continues to grow. The future is obvious. The question is: How will we respond?

By virtue of machine learning capabilities, Cyber 3.0 is the only approach that can rise to these challenges and deliver the incisive intelligence required to protect our critical assets and communities now and into the future.

About the Author



John Trobough is president of Narus, Inc., a subsidiary of The Boeing Company (NYSE: BA).  Trobough previously was president of Teleca USA, a leading supplier of software services to the mobile device communications industry and one of the largest global Android commercialization partners in the Open Handset Alliance (OHA). He also held executive positions at Openwave Systems, Sylantro Systems, AT&T and Qwest Communications.







About the Company


Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity.  Narus is one of the first companies to apply patented advanced analytics to proactively identify cyber threats from insiders and outside intruders. The innovative Narus nSystem of products and applications is based on the principles of Cyber 3.0, where the semantic Web and cyber intersect. Using incisive intelligence culled from big data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, empowering organizations to better protect their critical assets. Narus counts governments, carriers and enterprises around the world among its growing customer base. The company is based in the heart of Silicon Valley, in Sunnyvale, California.

CyrusOne Builds Texas Internet Exchange (IX)


CyrusOne introduced its Texas Internet Exchange (IX), an on-net platform deployed across its data centers in Austin, Dallas, Houston and San Antonio.

The exchange uses redundant Brocade MLXe Series switches, which enable high-density, 10-Gigabit Ethernet (10GigE), and 100-Gigabit Ethernet (100GigE) connections, enabling huge traffic exchanges at line-rate speeds. At the optical transport layer, CyrusOnes is using Infinera DTN digital optical platforms that have rapidly scalable point-to-point transport at up to 2.5-terabit speeds.

The company said its platform enables hot-hot production or disaster recovery operations to occur MPLS ports or dedicated optical waves for interconnection failover between metro areas with online carrier selection via CyrusOne automation tools.

“Using the CyrusOne Texas IX platform frees customers from the constraint of having to choose solely between telecom carriers housed within a specific physical facility,” said Josh Snowhorn, vice president and general manager of Interconnection for CyrusOne. “Now, customers can identify and configure connections with any provider or partner at any connected facility. Customers who choose to deploy on the CyrusOne Texas IX gain significant advantages in performance, efficiency, and workflow continuity. No matter what kind of scalability the customer chooses, this solution is built to deliver superior capabilities and return on investment when connections are required within a metro area or city-to-city.”

http://www.cyrusone.com

CyrusOne currently operates 24 data centers worldwide.

FCC to Review Cell Phone RF Exposure Limits


The FCC will undertake a review of rules  related to health and safety of radio frequency (RF) emissions from radio transmitters.

Specifically, the FCC is opening an inquiry to consider both the currency of its RF exposure limits and possible policy approaches regarding RF exposure so as to determine whether the current rules and policies should remain unchanged, or should be relaxed
or tightened.

More specifically, the FCC said it aims to clarify evaluation procedures and references to determine compliance with current RF limits, including specific absorption rate (SAR) as a primary metric for compliance, consideration of the pinna (outer ear) as an extremity, and measurement of medical implant exposure.

http://www.fcc.gov/document/fcc-review-rf-exposure-policies

AT&T Reaches Labor Agreement in California and Nevada

AT&T and the Communications Workers of America District 9 reached a tentative labor agreement covering more than 17,000 wireline employees in California and Nevada.

The three year deal, which will be submitted to the CWA's membership for a ratification vote, includes general wage increases in each year of the contract – 2.25 percent effective Oct. 1, 2012, 2.75 percent in 2013, 3 percent in 2014, and 2.5 percent in 2015. It includes a 1 percent pension band increase in each year of the contract for most employees, and expansion to additional employees of a provision that provides qualified surplus employees a guaranteed job opportunity with AT&T. It maintains one of the most robust health care plans in the nation, with increases in employee contributions.

http://www.att.com/corewirelinebargaining


Shehzad Merchant Joins Gigamon as Chief Strategy Officer


Gigamon named Shehzad Merchant as Chief Strategy Officer.

Previously, Merchant served as the CTO at Extreme Networks and prior to that as the co-founder and VP of Products at Polytime Systems. Merchant has also held various senior architectural and research roles at Allied Telesyn, Nevis Networks and SRI.

http://www.gigamon.com

Proximal Data Raises $2M for Hypervisor Caching


Proximal Data, a start-up based in San Diego, raised $2 million in Series B funding for its server-side caching solutions specifically designed for virtualized environments.

Proximal Data offers adaptive I/O caching to increase virtual machine (VM) density up to three times. It plugs into hypervisors, such as VMware’s ESXi, and transparently works on all I/O without requiring agents in guest operating systems. By placing hot I/O onto a PCIe flash card or SSD, AutoCache intelligently supplies priority data traffic to VMs.

Funding came from Avalon Ventures and Divergent Ventures.  Proximal has raised $5 million to date.

http://www.proximaldata.com

Saturday, March 30, 2013

Clearwire Takes $80M in Sprint Financing, Continues Discussions with DISH


Clearwire elected to take an $80 million April draw under the terms of its agreements with Sprint.  The funding is in the form of exchangeable notes, which will be exchangeable under certain conditions for Clearwire common stock at $1.50 per share.

Clearwire also stated that it continues discussions with DISH over its proposal and that it intends to pursue the course of action that it believes is in the best interests of Clearwire's non-Sprint Class A stockholders.

http://corporate.clearwire.com/releasedetail.cfm?ReleaseID=751927


Friday, March 29, 2013

D-Link Ships 802.1ac Cloud Wi-Fi Router


D-Link introduced its Wireless AC1200 router (DIR-850L) featuring 802.11AC supporting dual band speeds of up to 300Mbps (2.4GHz) and 867Mbps (5GHz). The unit is optimized for wireless HD video streaming inside the home. It also offers four Gigabit Ethernet ports.

D-Link features a "mydlink Cloud Management" capability that enables the user to monitor and manage the network from anywhere, including remote file access by mobile devices.

http://www.dlink.com/us/en/home-solutions/connect/routers/dir-850l-wireless-ac1200-dual-band-gigabit-cloud-router

KPN Picks VMTurbo's Operations Manager


KPN has selected VMTurbo's Operations Manager to automate and control cloud operations.

VMTurbo is an intelligent workload management system that serves as an automated control plane for cloud and virtualized data centers. It allocates infrastructure resources in service provider data centers.

The VMTurbo platform first launched in August 2010 and the company claims more than 9,000 deployments by cloud service providers and enterprises worldwide, including BT, Colgate, CSC and the London School of Economics.

http://www.vmturbo.com


IBM to Build Tier IV Data Center for Telkom Indonesia

Telkom Indonesia has selected IBM to build a state-of-the-art data center. The new Tier IV facility will be built to the highest standards of energy efficiency. http://www.ibm.com