Remove Architecture Remove Case Study Remove Network
article thumbnail

Axiata and Infosys adopt openness as a strategy

TM Forum

In order to achieve Axiata’s goals, the two partners are adopting “openness” as a strategy, including a collaboration on a commercial open radio access network (RAN) deployment that aligns with the TM Forum’s Open Digital Architecture (ODA) and Open APIs.

Infosys 130
article thumbnail

6 Ways Sanmina maximized its Zscaler Zero Trust Exchange investment

Network World

The rationale for transitioning from a legacy architecture to Zscaler zero trust When I joined Sanmina in 1999 as a technical support person, security measures were sorely lacking. We realized we simply couldn’t implement a zero trust architecture using traditional VPN technology. All in all, it’s a win-win for our entire enterprise.

Security 155
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DTWS: Telia's path to zero-touch automation

TM Forum

As Telia Company ramps up its digital transformation it is using automation to improve customer experience through faster service delivery and has zero-touch automation in its sights, notably for network slicing. ” Zero-touch automation comprises the idea that a network essentially sorts itself, its services, and its problems out.

B2C 130
article thumbnail

Mastering sustainability challenges in the water domain with smart meter synergy

CIO Business Intelligence

The smart meter program fits into the water utilities’ broader vision to digitalize water networks to face current sustainability challenges across the water sector. The solution allows the company to implement a business data fabric architecture and delivers self-service analytics features, allowing more users to access authoritative data.

SAP 111
article thumbnail

Hadoop Security: New book by Ben Spivey and Joey Echeverria Is Exactly What The Community Needs

CTOvision

In this book, Cloudera professionals Ben Spivey and Joey Echeverria provide a thorough treatment of Hadoop security architecture and implementation to help architects navigate the common challenges of this phase. Example case studies demonstrate how the book’s material is immediately applicable to your use cases.

Security 150
article thumbnail

10 generative AI certs and certificate programs to grow your skills

CIO Business Intelligence

The course covers principles of generative AI, data acquisition and preprocessing, neural network architectures, natural language processing, image and video generation, audio synthesis, and creative AI applications. You’ll be tested on your knowledge of generative models, neural networks, and advanced machine learning techniques.

article thumbnail

Harness AI’s potential and navigate disruption with Digital Realty

CIO Business Intelligence

Cloud as a case study: What we learned The cloud journey is a good case study for thinking about disruption. A range of state-of-the-art tools to build optimized AI architectures and the ability to digitally engineer deployments in virtual environments. We’re also committed to sustainable growth.