Learn about Ribbon Call TrustTM, an identity assurance solution that encompasses STIR/SHAKEN and on a per-call, real-time basis will: determine caller intent and identify bad actors from network and call data analytics; provide multi-dimensional reputation scoring using Machine Learning algorithms; and recommend optimal call validation treatment. And will do this for both IP and TDM phone calls. With Ribbon Call Trust™ you can defeat robocalls and fraud attacks, truly restoring your customer’s trust in the phone.
The implications of advanced wireless technologies will be far-reaching. How do enterprises view these technologies and what does this mean for carriers? Join this webcast for key insights and to explore what carriers should consider. Register now.
Join us to learn how IBM and Red Hat have combined to radically reduce network operations expenses with intelligent automation using open platforms, featuring a closed loop automation demo. Register now.
Find out how a distributed, disaggregated, and open routing approach offers numerous benefits, including better network agility, unlimited scale, end to vendor lock-in, and reduced costs. Register now.
Simple cloud telephony migrations? They don’t exist. However, with a little education and pre-planning, you can side-step some of the frequent obstacles that organizations encounter. Register now!
This webinar series will examine the challenges and promises of managing Digital IDs across devices and beyond.
- Digital ID – Across Multiple Personal Devices
January 16, 2020 | 11am ET / 8am PT
Understand key use cases of cross device identification and examines the use of an ‘Entitlement Server’ as being responsible to control the sharing of identities with devices via stringent authentication processes and protocols.
- Digital ID – Functions and Building Blocks
January 30, 2020 | 11am ET / 8am PT
This webinar will scan the critical elements for today’s trusted management of multiple identities and will draw their evolution to enable CSPs’ pivotal roles in the upcoming digital identity eco-systems.
- Digital ID - Between eSIM, 5G Edge, Wi-Fi 6 and Enterprises Systems
February 13, 2020 | 11am ET / 8am PT
Explore the opportunity for CSPs to provide Digital ID to external entities over both wireless and fixed access and for distributed services at the edge.
Join this webinar to get an insider’s first look at these newly defined Release 17 projects and discover how these new projects will take us another step closer to delivering on the 5G vision. Register now.
Research shows that the 5G enterprise and IoT market could be a $619 billion opportunity by 2026. In this webinar, experts from Openet and VoltDB will explore the lucrative opportunities of a 5G-enabled enterprise for telcos and why the ability to harness real-time data is an absolute necessity in empowering the full monetization of 5G-enabled services. Register now.
Attend this webinar to hear strategies and challenges to address to ensure success with Wireless & Wireline convergence and the implementation of 4G densification & 5G magnitude to increase access points in the outside plant. Register Now!
This webinar series will examine the challenges and promises of operating in a software-defined core network.
- 5G Capacity Planning - Sizing in a Cloud Native Environment
Recorded on September 30, 2019
Learn about the use of known queueing theories and steady state modelling to understand the capacity of each microservice, thus being able to determine the capacity of a 5G network function.
- 5G Orchestration and Automation toward Zero Touch Service Management
Recorded on October 10, 2019
Explore business usages and opportunities that call for adoption of more automatic network operations, and will examine design best practices to support them.
- 5G Integration and Operations in a Multi-Vendor, Container-Based Architecture
Recorded on November 7, 2019
Join this webinar to examine design principle and practices to support running of Cloud-Native 5G.
Join this webinar to learn how converging legacy and modern packet services onto a common packet-based network simplifies service delivery while reducing costs to retain existing and attract new customers. Register now!
With first 5G commercial services already launched, the industry is now gearing up for massive network buildouts. Because of the huge investments involved, clearly understanding where the potential customers are located, and how to optimally deploy infrastructure to maximize ROI is a critical requirement for operators. Accurate location data, be it customer demographics or utilities and fiber availability on the towers is a critical component of that requirement. Tune in to this webinar to understand how to employ augmented data for richer, faster location analytics and data-driven decisions.
See how far Qualcomm has come on the journey to 5G commercialization, learn what new 5G technologies are in the works, and understand how advances in AI and the edge cloud will complement the continued evolution of 5G and deliver on the full promise of their 5G vision. Register now!
The first use case for 5G is obviously improved mobile connectivity with faster speeds and lower latencies. But beyond that, the sky’s the limit for 5G use cases, which will probably emerge as a result of real business needs. Register Now!
Attend this webinar to learn more about the intricacies of real-world 5G environments and how 3D channel modeling software can simplify the creation of complex propagation scenarios in a lab setting. Register Now!
Join this webinar to learn about new eMBB use cases that 5G has opened for the IoT market, things to consider when designing a 5G connected product, what designing a module taught us about 5G, and tips to keep your 5G device and data secure. Register Now!
Release 16 will focus on ecosystem, end-to-end network orchestration and may encourage more key network parameters, rather than capacity and top speeds. This webinar explores how URLLC, edge computing, network automation and orchestration will evolve the existing wireless ecosystem. Register now.
While monetization is the primary concern for launching 5G, a close second is how to protect the infrastructure from threats such as fraud, intrusion and any anomalous behavior. In this webinar, VoltDB Chief Technologist, Dheeraj Remella, will explore how to leverage data and machine learning for real-time threat prevention in the 5G era. Register now.
This webinar will discuss how Release 14 C-V2X, the initial phase of C-V2X, is gaining momentum with expected commercial readiness around 2019, the role of C-V2X and 5G in enabling smarter transportation, and more. Register now!
Learn more about the need for frictionless authentication, and the risks involved and the potential for fraud. How will biometric solutions address the problems? Register now and hear recent use cases where biometrics have been used in the customer support channels to address potential fraud.
The webinar will discuss 5G application-driven network performance requirements and key focus areas for testing. It'll also cover both expected and unexpected test challenges and how to assure you’re prepared for what lies ahead. Register now!
This webinar will present the outcomes of an economic analysis of alternatives in telco cloud infrastructure design in large-scale service provider deployments. Register now!
The emerging enterprise edge will use a cloud architecture to drive new efficiencies for security, load balancing, SD-WAN, and WAN optimization functions and performance when connecting to the cloud. This webinar will take a deep dive look into the new architectures for enterprise edge compute with cloud connectivity, including advantages, best practices, use cases, and success stories. Register now!
In this webinar, you will learn more about the regulatory aspects, architecture and deployment best practices for STIR-SHAKEN. Register Now!
Edge computing, one of the hottest topics in technology today is changing how enterprise applications and systems are deployed. Retail and hospitality operators are at the forefront of the digital transformation. Learn more about the changes and what it means for you.
While the throughput and propagation characteristics of low and mid-band radios are well known, we’re still in early days with mmWave. Industry experts leading this webinar will discuss the technical, physical, and financial challenges of enabling your workforce to perform the task at hand, as this new technology moves from the lab and into the real world.
Join this webinar to hear actual use cases for in-call speech applications, real-time and recorded speech and meta-data analytics (amongst others) during this interactive and provocative session. Register Now!
For more than a decade, carriers and mobile operators have actively been exploring opportunities offered by the smart cities and wider IoT markets. This webinar will discuss the future of carriers beyond their connectivity heritage and how they can take on the “untelco” role. Register now!
The Internet of Things is changing the way we interact with devices, organizations, and each other. At the same time, it opens new avenues for security vulnerabilities, with more complex and distant connections between devices, software, networks, the cloud, and enterprise systems. Register now to learn why security is critical for the Internet of Things
This webinar, presented by FierceWireless and Senza Fili, is a preview of a report that discusses how edge computing challenges the RAN/core separation and changes the end-to-end network architecture, and the impact it will have on the on the business case, services and user experience. Register Now.