Partner Resources

Connecting the Digital World

Telecommunications service providers must reinvent themselves to overcome multiple challenges in an ever-shifting market landscape. Red Hat has developed an open NFV solution for service providers, providing a scalable, high-performance, and reliable platform based on the NFV reference architecture. The Red Hat® NFV solution helps transform networks, infrastructure, and the organization itself, allowing service providers […]

Telenor’s multi-vendor platform approach to NFV is a foundation for 5G

Telenor’s multi-vendor NFV initiative, including Red Hat® Enterprise Linux®, helps transform business, IT, and networks for greater efficiency. This Analysys Mason paper shows how Telenor NFV reduces cost and complexity despite high rates of traffic growth and lays the foundation for 5G and innovation in telecommunications.

eBook: Boost Business Agility

Developers need resources provisioned for them quickly so they can get started on the next big idea. Operations need to maintain security and reliability in their infrastructure. Together, using hybrid cloud, multicloud, container, and Kubernetes technologies, IT can provide the agility and stability needed to deliver services faster. Red Hat® open source technologies provide a […]

5G Monetisation White Paper

5G can mean increased revenues – if operators have the correct systems in place to enable them to quickly make the most of the new revenue opportunities. In order examine the system developments that are needed Openet have teamed up with leading analyst firm Omdia to produce a white paper on 5G monetisation. This paper […]

Network Performance Score – The Single Score for Network Quality of Experience (QoE)

Many different and fragmented proprietary scores have swept the market over the years and the methods of scoring are not transparent. Therefore, the ETSI STQ group has harmonized the process and released the technical report TR 103559, which defines best practices for network QoS benchmark testing. The Network Performance Score (NPS), which is integrated in […]

Edge computing and deployment strategies for communication service providers

This white paper describes edge computing from a CSP perspective, – how a solution is built up, the key industry challenges and how CSPs can choose different roles and deployment strategies when addressing opportunities. Depending on their market position and type of use case provided, they can choose an optimal model or a combination of […]

Cellular IoT in the 5G era

There are over 1 billion cellular IoT connections today in 2020, and Ericsson forecasts around 5 billion connections by 2025. With 5G in the market, almost every industry is exploring the potential of cellular connectivity for fundamentally transforming businesses. This paper presents a clear evolution path for CSPs to address all 5G-IoT use cases, from […]

5G migration strategy: From EPS to 5G system

Introducing the 5GS to provide mobile broadband (MBB) in an existing 4G EPS network has significant impacts across all network domains – from the RAN, to packet core, user data and policies, and services – as well as backend systems. This Ericsson Technology Review article provides an overview of all the aspects that CSPs need […]

Best practice for end-to-end IoT security

Security is one of the most significant barriers to IoT deployment, together with funding, interoperability and the business model . Fraud is growing in this area, and industry leaders across the ecosystem agree that securing the IoT application is the only way to fully develop its business potential. The good news is that the vast […]

Case Study: Amdocs creates dynamic development with Red Hat OpenShift

Amdocs’ mission is to deliver business improvements that create growth for its communications and media customers. As these industries become more dynamic, Amdocs sought to become faster and more agile in its service development approach. By building key new OSS/BSS applications as microservices running on Red Hat OpenShift Container Platform, the company can deliver new […]

F-Secure Attack Landscape H2 2019

2019 wrapped up with high-impact ransomware attacks on enterprises, as well as continued high rates of attack traffic throughout our global network of honeypots. Honeypot traffic was driven by action aimed at the SMB and Telnet protocols, indicating continued attacker interest in the Eternal Blue vulnerability as well as plenty of infected IoT devices. The […]

The Impact of 5G on the Secondary Device Market

As predicted, many global consumers have been holding on to their current smartphones in anticipation of 5G. Not only will 2020 see a huge number of 5G smartphone upgrades, it will also see hundreds of millions of used device trade-ins. This exclusive report will reveal: The extent of the used device deluge facing operators, OEMs […]

Filling the gap in IoT security to protect the connected home

Just a few years ago, service providers were adapting to consumers’ growing use of mobile devices and introducing solutions to secure not just computers, but smartphones and tablets. Fast forward to today, and consumers are quickly acquiring smart thermostats, light bulbs, TVs, gaming consoles and other connected things. What was once a trend in multi-device […]

Is identity theft the cyber crime consumers fear most?

This new report by F-Secure explores consumer views on identity theft and cyber crime. According to an F-Secure survey, most people think they’ll likely be victims of identity theft or cyber crime. And with good reason. Criminals who get hold of personal data data try anything from hacking our critical accounts to taking over our […]

VIAVI Solutions: Network Slicing – Test Now, Succeed Later

Network slicing is fundamental to make 5G networks successful. This whitepaper introduces the concept of network slicing and provides an overview of three primary 5G service types and core network functions. It also highlights how operators and network equipment manufacturers (NEMs) can take a lead on the competition by adopting test and measurement solutions available […]

The Path to Cloud-Native Applications

The cloud-native approach describes a way of modernizing existing applications and building new applications based on cloud principles, using services and adopting processes optimized for the agility and automation of cloud computing. This e-book describes detailed steps as a part of a successful journey from where you are today to adopting a cloud-native application approach. […]

Unlocking the potential of in-building wireless service

The need for in-building wireless connectivity is increasingly a strategic requirement for enterprise communications and business applications. These are already in heavy use due to the advent of smartphones and LTE, and they will become even more critical with 5G. Operators, however, do not have the resources to “light up” every major commercial building. Neutral […]

4G and 5G Capacity solutions – comparative study

Operators are looking to optimize their costs while increasing their 4G/5G network capacity to meet the ever-increasing demand for data. Among the strategies being employed is the use of various antenna technologies to enable higher data rates. These include multiple-input, multiple-output (MIMO) techniques such as beamforming, as well as the use of multibeam and active […]

Viavi 5G Fronthaul Handbook

The 5G Fronthaul Handbook is a guide to understanding the impact of 5G on transport networks and key test considerations for ensuring reliable performance and high quality of service. 5G technology is touted as an innovation platform that will enhance our connected world. To deliver on this promise, 5G will demand the network supporting it […]

Increase OSS and BSS efficiency with Red Hat agile integration

Disparate operations support systems (OSS) and business support systems (BSS) lack scalability and limit the value of network and application data. IT teams need federated access to legacy systems and data, while developers and partners need secure, easy access to systems. An application programming interface (API)-centric approach to integration, secured via API management, addresses these […]

Polls

Sorry, there are no polls available at the moment.