Skip to main content

NFV/SDN/Cloud Transformation for Telecom service provider


During our NFV transformation project within a global Telco Group in the region, we got the chance to lunch a big RFP(Request for proposal) to select the right list of vendors to help us during this journey.

We have defined a target strategy and set a clear roadmap for the different project millstones.
The project was divided on many phases, one of the big phase was about transform the underlying infrastructure footprint that will hosts the NFV,IT and public cloud workload.
The infrastructure phase was about select the right vendors for several domains. Below are the list of covered domains at that time:
  •          Compute domain
  •          Storage domain
  •          Datacenter Network domain
  •          Hypervisor domain
  •          Storage virtualization domain
  •          Software defined network SDN
  •          Cloud management platform domain

You might ask why we decided to divide the scope on many domains.
In fact, we believe that through software defined solution the technology is more and more software oriented. And what was no able to be done before through software solution is nowadays possible.
Hardware solutions are more and more commodity, and market is really mature in these domains. This includes existing old vendors and new ones who lunched recently (3 years back) their new infrastructure equipment’s solution.  I’m speaking here about Telco vendors who try to provide end to end solution to keep the market share under their control as before.

Cloud transformation is a hot subject for Telecom operators. Adapting new methodology of work for operation, procurement, organization is not an easy task to do.

Historic telecom vendors are facing the some challenge but with more stress coming from  concurrence and new actors in the market.

Transform sales model, target new teams, adapt new skills for cloud, NFV and SDN is not a monthly effort.

Big carrier like At&T, Telefonica, orange have taken the lead on such initiative and try to drive their organization to the right strategy.
Back to technology market, there are many organizations, groups that try to help carrier doing such transformation.

We have spent long time analyzing different approach from ETSI NFV , TMForum , OpenNFV, etc  and we have tried to build a transformation framework helping carriers transform their self through  a practical angle.

In our next posts, we will try to describe in details different steps to follow to start your NFV-SDN-Cloud transformation.

Stay connected and follow us in twitter and social networks.



Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...