Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Huawei Steps Up NFV Game With New Lab

30/01/2015 by Sharon Shahzad

W1siziisijiwmtuvmdevmzavmtyvmtmvmdmvmti3l0h1yxdlas5qcgcixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

Huawei has stepped up its NFV game with the launch of a lab in Xi'an, west China.

The NFV Open Lab, which formally opened its doors last week, is aimed at providing an NFV testbed for all comers. Initial collaborators include China Mobile Ltd, VMware Inc, RedHat China and Hewlett-Packard Co.

Radoaca Vasile, head of NFV integration architecture for Huawei Technologies Co. Ltd. , said the company is spending $5 million on the initial buildout of the lab and has set aside up to $30 million for the next phase.

Huawei lists multi-vendor interoperability, integration complexity and O&M optimization as some of the issues the lab will grapple with. But it is also planning to build platforms that will help enable NFV management, such as for multi-vendor verification and big data analysis.

Vasile says Xi'an was chosen as the facility site because Huawei already has 10,000 researchers there working on IT-related projects. The NFV lab has just 30 or so full-time staff, but across the company Huawei has 500 engineers involved in NFV projects with more than 20 operators.

For Huawei, NFV, SDN and the cloud are part of its SoftCOM architecture for network operations. (See Interview With Bill Zhang, Director of SoftCOM Product Management, Huawei.)

But the transition to the next-gen architecture also means a shift to a business model based around consulting and business integration rather than just selling gear. That's new territory for Huawei, Vasile acknowledges. (See Huawei Boasts 2014 Revenues of $46B.)

He says the open lab is a way of re-framing Huawei as a trusted integrator and consultant.

"Because there's so much complexity we need to create this trust relationship [with telcos]. Here they can see it, they can test it, they can prove it," he said. "If you look at the overall value of the solution, we believe that integration will be the big app for us. It's something that telcos can outsource. It will be a very interesting model."

This article has been extracted from http://www.lightreading.com, please click on this link to read the article in full http://www.lightreading.com/nfv/nfv-tests-and-trials/huawei-steps-up-nfv-game-with-new-lab/d/d-id/713352

Montash is a multi-award winning global technology recruitment business. Specialising in permanent and contract positions across mid-senior appointments across a wide range of industry sectors and IT functions, including:

ERP Recruitment, BI & Data Recruitment, Information Security Recruitment, IT Architecture & Strategy Recruitment , Energy Technology Recruitment, Demand IT and Business Engagement Recruitment, Digital and E-commerce Recruitment, Leadership Talent, Infrastructure and Service Delivery Recruitment, Project and Programme Delivery Recruitment.

Montash is headquartered in Old Street, London, in the heart of the technology hub. Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...