6GWorld spoke to BAI Communications' Brendan O'Reilly about the evolution of private networks and the directions it is taking for the future. We discuss the commercial drivers behind private networking; the role of Edge, Cloud and IT integration; the risk of legacy in private networks; and where the business is headed.
"Cloud gaming has become the killer service for 5G," says Blacknut CEO Olivier Avaro. The company sits in a unique position to discuss the interplay between telecom networks and the gaming industry.
But if you are pinning your hopes on VR as the next revolution in gaming... think again. It's going to be both more pragmatic and more transformational than you think.
Other industries are also taking advantage of multi-access edge computing
Ahead of Mobile World Congress, 6GWorld sat down with Susan James, Senior Director of Telecoms Strategy at Red Hat, to talk about the early indicators of adoption they are seeing in edge networking and how that relates to other trends such as private networking.
We examine the realities of edge networking technology, analytics and the business models that might make it viable.
This conversation was based on Dr David Soldani's recent paper "6G Fundamentals: Vision and Enabling Technologies Towards Trustworthy Solutions and Resilient Systems”, which brings together an overall view of what a network in 6G might end up requiring and looking like. This video introduces a few of the ideas expressed in the paper, including the need to combine machine learning and machine cognition, and how a network that is designed to sense can also be better at protecting privacy.
You can read or download the whole paper in the ‘Latest Research’ section of 6GWorld.
This White Paper, the very first initiative in this domain, aims to identify aspects of security where the nature of edge computing leaves typical industry approaches to cloud security insufficient.
Edge computing environments are characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment and both HW and SW devices. Given this overall level of system heterogeneity, security, trust and privacy are key topics for the edge environments.
In this heterogeneous scenario, end-to-end MEC security considers the impact on the elements coming from all stakeholders involved in the system. The paper provides an overview of ETSI MEC standards and current support for security, also complemented by a description of other relevant standards in the domain (e.g. ETSI TC CYBER, ETSI ISG NFV, 3GPP SA3) and cybersecurity regulation potentially applicable to edge computing. The White Paper concludes on a general perspective of future evolutions and standard directions on MEC security.
Colt Telecoms has released a report compiled by Censuswide, exploring what is driving the next era of cloud adoption.
It surveyed 400 IT decision-makers and C-level executives, across Europe and Asia.
• There is an increase in cloud projects, driven by technology evolution and emerging solutions.
• Businesses have a hunger to transform digitally, reduce legacy standards and embrace a whole new generation of compute, connectivity and partnerships.
• APIs and edge computing were some of the most significant elements according to respondents.