Your Network's Edge®
RAD Blog
You are here
About the Blog
Welcome to the official blog of RAD, a global telecom access solutions and products vendor. We’ll be blogging on a wide range of hot topics affecting service providers and critical infrastructure network operators. Our resident experts will be discussing carrier ethernet, 5G, industrial IoT, networking traffic insights, remote asset monitoring with edge computing, smart cities, and more.
Enjoy!
-
May 13, 2019
-
May 06, 2019
Network disaggregation, and NFV in particular, opens the door for communications service providers (CSPs) to make their technology validation and procurement cycles more agile.
-
Apr 29, 2019
After reviewing, at length, zero-touch provisioning (ZTP) for uCPEs, in this blog post we will focus on secure ZTP for IIoT over public networks.
-
Apr 22, 2019
Organizations looking to roll out Industrial IoT (IIoT) deployments face many issues that require addressing, as has already been discussed here in this blog.
-
Apr 15, 2019
IP forwarding is typically based on destination addresses (and perhaps the DSCP), but sometimes we need better control over the precise path a packet travels to its destination.
-
Apr 08, 2019
Despite widespread endorsement of competition law theories, the western world has become very monopolistic when it comes to anything that is connected to the Internet.
-
Apr 01, 2019
Smartphones are on everyone’s list of the greatest inventions of all times. In fact, one could even assert that mankind’s major innovations were: 1) fire, 2) spoken language, 3) the wheel, 4) agriculture, and 5) the smartphone.
-
Mar 25, 2019
-
Mar 18, 2019
In part 1 and 2 of this blog series, we discussed the issue of authentication between the uCPE and the different network ZTP entities and explained why and how the use of X.509 certificates brings great simplification to this problem. In this third part, we will touch upon another “painful” topic that is also related to ZTP: Software licensing.
-
Mar 11, 2019
The first part of this blog series laid the foundation of the security issues involving uCPE ZTP over public networks (and also in general). We also discussed the issue of authentication between the uCPE and the different network ZTP entities.
Sign up to receive our newsletter