Click here to close now.

Welcome!

Cloud Expo Authors: Pat Romanski, Carmen Gonzalez, Elizabeth White, Liz McMillan, John Wetherill

Blog Feed Post

Transition Networks, a Carrier Ethernet 2.0 Pioneer, Paves the Way with CE 2.0 Certified Products

Transition Networks continues its customer focus as one of first vendors worldwide to receive the MEF CE 2.0 certification

Minneapolis, MN — January 31, 2013 — Transition Networks Inc., the fiber access technology expert, a wholly owned subsidiary of Communications Systems, Inc. (NASDAQ-GM: JCS), today announced that it is in the first round of Carrier Ethernet vendors to receive the MEF CE 2.0 certification on its S3280 intelligent Ethernet demarcation device.

As Transition's foundational product in the company's portfolio of service provider products, the S3280 was developed to assure compliance with the new CE 2.0 services, simplifying the ability for service providers to deploy new services for Business Ethernet, Cloud Service Delivery, Wholesale Ethernet, and Mobile Backhaul Applications. CE 2.0 compliance testing and certification for the S3280 consisted of numerous test cases performed by Iometrix, Inc., the official MEF certification test lab

The MEF Carrier Ethernet Certification Program is designed to ensure that global equipment and services comply with MEF standards and pave the way for interoperability. "CE 2.0 is a highly challenging and significant accreditation to achieve. The CE 2.0 test plan sets a new standard for Carrier Ethernet services, which involves hundreds of exacting test cases. MEF CE 2.0 Certification creates an important standard of deployment for the marketplace. Over 155 companies are now certified for CE 1.0 and the adoption signs for 2.0 are exciting," said Bob Mandeville, President and Founder of Iometrix. "The demand for certified products and services is a driving force, and we expect a significant increase in service provider members from emerging economies in 2013. The strong demand for CE 2.0 capability is illustrated by the first 20 CE 2.0 certified vendors in San Diego today."

MEF CE 2.0 Framework:
The new CE 2.0 extends the original purpose of Carrier Ethernet with vital added features, including multiple classes of service, greater manageability and easier interconnect for eight standard service types, enabling new levels of efficiency for mobile backhaul, making it easier for a large number of access providers to join the Carrier Ethernet community and establish Carrier Ethernet as a business class cloud service carrier.

"Transition Networks continues to develop leading edge products for service providers that enable them to streamline Ethernet services for business and mobile backhaul applications within a highly reliable environment," said Kevin Faulds, Director of Product Management at Transition Networks. "Transition Networks is honored to be among the first vendors to achieve the CE 2.0 certification, further showing our commitment to Carrier Ethernet and leading industry organizations like the MEF."

This latest certification is further evidence of Transition Networks' dedication to providing products that help service providers simplify their network, while adding the most advanced features, to enable additional revenue capabilities and service offerings. The S3280 family of Carrier Ethernet NIDs and access switches share the same software platform that has been certified under CE 2.0 and built to meet the demands of greater reliability, increased performance and ease of management in an intuitive easy to use interface. Adding Transition Networks' certified CE 2.0 S3280 product coupled with our Converge™ Element Management system will significantly reduce the total cost of network ownership, reducing service provisioning time, accelerating the time to revenue, and increasing service returns.

"The achievement of the CE 2.0 equipment vendors is a testament to their commitment to outstanding delivery to the Carrier market. MEF CE 2.0 standards will enable carriers to choose equipment vendors with greater speed, clarity and certainty." Ihab Tarazi Chairman of the Board, MEF, Vice President of Global Planning and Technology Verizon

MEF CE 2.0 Information:
For more information on Transition Networks CE 2.0 certified products please contact Transition Networks at (800) 526-926, +1 (952) 941-7600 or www.transition.com for the latest information.

About The MEF:
The MEF is a global industry alliance comprising more than 200 organizations including telecommunications service providers, cable MSOs, network equipment/software manufacturers, semiconductors vendors and testing organizations. The MEF's mission is to accelerate the worldwide adoption of Carrier-class Ethernet networks and services. The MEF develops Carrier Ethernet technical specifications and implementation agreements to promote interoperability and deployment of Carrier Ethernet worldwide.

*For more information about the Forum, including a complete listing of all current MEF members, please visit the MEF web site at http://www.MetroEthernetForum.org/

About Transition Networks Inc.
Transition Networks has achieved international recognition as a major manufacturer of high quality access and backhaul equipment for data communications and telecommunications applications. Transition Networks has been a long-time active member of the MEF and a proponent for the proliferation of Ethernet technology in Carrier access networks. Transition Networks has previously achieved Carrier Ethernet Generation 1.0 certification (MEF 9, 14, and 21), and the S3280 and S3280-TST are now CE 2.0 certified. Based in Minneapolis, Transition Networks distributes hardware-based connectivity solutions exclusively through a network of resellers in 50 countries, including Ingram Micro and Tech Data. Transition Networks is a wholly owned subsidiary of Communications Systems, Inc., a publicly traded company (NASDAQ-GM: JCS).

Statements regarding the Company's anticipated performance in 2013 are forward-looking and involve risks and uncertainties, including but not limited to: competitive products and other factors discussed from time to time in the Company's filings with the Securities and Exchange Commission.

Company Contact:
Jacob Pomplun
Transition Networks
(952) 996-1575
[email protected]

Editorial Contact:
Kim Miller
Tier One Partners
(617) 610-0583
[email protected]

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
Move from reactive to proactive cloud management in a heterogeneous cloud infrastructure. In his session at 16th Cloud Expo, Manoj Khabe, Innovative Solution-Focused Transformation Leader at Vicom Computer Services, Inc., will show how to replace a help desk-centric approach with an ITIL-based service model and service-centric CMDB that’s tightly integrated with an event and incident management platform. Learn how to expand the scope of operations management to service management. He will al...
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises a...
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
In this scenarios approach Joe Thykattil, Technology Architect & Sales at TimeWarner / Navisite, presented examples that will allow business-savvy professionals to make informed decisions based on a sound business model. This model covered the technology options in detail as well as a financial analysis. The TCO (Total Cost of Ownership) and ROI (Return on Investment) demonstrated how to start, develop and formulate a business case that will allow both small and large scale projects to achieve...
The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for applica...
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
After a couple of false starts, cloud-based desktop solutions are picking up steam, driven by trends such as BYOD and pervasive high-speed connectivity. In his session at 15th Cloud Expo, Seth Bostock, CEO of IndependenceIT, cut through the hype and the acronyms, and discussed the emergence of full-featured cloud workspaces that do for the desktop what cloud infrastructure did for the server. He also discussed VDI vs DaaS, implementation strategies and evaluation criteria.
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually need them. However, the concept of skeuomorphism can be thought of as relating more broadly to applying existing patterns to new technologies that, in fact, cry out for new approaches. In his session at DevOps Summit, Gordon Haff, Senior Cloud Strategy Marketing and Evangelism Manager at Red Hat, will discuss why containers should be paired with new architectural practices such as microservices ra...
With the arrival of the Big Data revolution, a data professional is expected to master a broad spectrum of complex domains including data processing, mathematics, programming languages, machine learning techniques, and business knowledge. While this mastery is undoubtedly important, this narrow focus on tool usage has divorced many from the imagination required to solve real-world problems. As the demand for analysis increases, the data science community must transform from tool experts to "data...
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at ...
Thanks to Docker, it becomes very easy to leverage containers to build, ship, and run any Linux application on any kind of infrastructure. Docker is particularly helpful for microservice architectures because their successful implementation relies on a fast, efficient deployment mechanism – which is precisely one of the features of Docker. Microservice architectures are therefore becoming more popular, and are increasingly seen as an interesting option even for smaller projects, instead of bein...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
The 3rd International @ThingsExpo, co-located with the 16th International Cloud Expo – to be held June 9-11, 2015, at the Javits Center in New York City, NY – is now accepting Hackathon proposals. Hackathon sponsorship benefits include general brand exposure and increasing engagement with the developer ecosystem. At Cloud Expo 2014 Silicon Valley, IBM held the Bluemix Developer Playground on November 5 and ElasticBox held the DevOps Hackathon on November 6. Both events took place on the expo fl...
The emergence of cloud computing and Big Data warrants a greater role for the PMO to successfully manage enterprise transformation driven by these powerful trends. As the adoption of cloud-based services continues to grow, a governance model is needed to orchestrate enterprise cloud implementations and harness the power of Big Data analytics. In his session at Cloud Expo, Mahesh Singh, President of BigData, Inc., discussed how the Enterprise PMO takes center stage not only in developing the app...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...