Welcome!

Microservices Expo Authors: Liz McMillan, Pat Romanski, Elizabeth White, Mehdi Daoudi, Yeshim Deniz

Related Topics: Containers Expo Blog, Java IoT, Linux Containers, Open Source Cloud, @CloudExpo, SDN Journal

Containers Expo Blog: Article

Network Virtualization – Who Will Prosper and Who Will Not? | Part 2

Virtualization means that everything will run on commodity hardware – the same as the rest of the commercial world

In my last blog, I looked at the evolution of technology as we move to virtualization. What will this new development mean for business models, industry developments and industry players?

Virtualization means that everything will run on commodity hardware - the same as the rest of the commercial world. No proprietary equipment, just generic devices and servers running software. Who will build the data centers? Probably the same set of companies that build data centers for everyone else. That is, not necessarily network equipment companies or phone companies.

Who will write the software? Presumably the network equipment companies, at first. But the cost of entry into a software-driven industry is much lower than the cost of entry into a hardware-dominated industry. Mass-producing software is far less expensive than mass-producing hardware, so new players will rapidly emerge and some of them will prosper. Just as likely, some of the existing players will not. An industry with thousands of large, medium and small companies has different dynamics than an industry dominated by a few giants.

Will communications service providers (CSPs) get into the software business? They understand how networks work, and the move to virtualization provides a new playing field in which CSPs stand as good a chance as any of creating new, reliable and secure software. Why shouldn't the CSPs work together in a sort of almost-open-source movement, share their products and services and reap the financial benefits?

And then who will design the networks and do the network capacity planning? Ultimately, the network will do most of that itself. Just as it is possible to write code that writes more code according to rules, it is possible to write code within the network that not only manages the traffic, but identifies when and where new capacity is needed, and installs itself in the newly activated devices. Where do those devices and servers come from? Anywhere; they are generic, standardized and commoditized.

Who will create network capacity by actually placing the building blocks in position? Some humans may do this, or maybe robots, but they don't need to work for the phone company. They could work for a sub-contractor or one of the companies that today we think of as equipment vendors. Or perhaps that is a whole new industry, in the same way house builders don't have to make bricks, or be architects, real estate agents or landlords. They just build and sell.

So who will actually own the network assets? It could be anyone, even a company that has no actual end users as customers. Virtualization, and all that goes with it, will make it possible to own network assets, and to offer those assets as capacity for others to rent. That capacity could then be used by whatever CSP needs it most at the time, and is willing to pay for it.

CSPs will both own and rent capacity, or rather their automated agents will do so on their behalf, guided by rules that will be developed initially by human coders, but which will evolve and be optimized by more software. And the fact that all network capability can be addressed by anyone with access means that we could end up with a rich network of niche relationships, with services appearing and disappearing like twinkling stars.

Users of the network today are somewhat imprisoned: they have limited choices of service providers and services. It may be in the interests of CSPs to keep it that way for a while, but ultimately the capabilities of the technology will create a completely new type of customer. The Internet has shown us the model: people can go almost anywhere they want to. But let's not confuse "The Internet" with "The Network." The global telecommunications network is bigger than the Internet, and actually contains it. It is this larger, all-containing global network that is being virtualized by network functions virtualization (NFV) and software-defined networking (SDN). Soon the flexibility and power created by this move to virtualization will spawn all sorts of new services driven by whoever wants them and is willing to pay their share for capacity. The Internet as we know it will be just one particular mode of networking. NFV and SDN can, and probably will, lead to a multiplicity of Internet-like services, both competing and collaborating, with different purposes and philosophies. Some of those exist just now, in the form of commercial, governmental and academic intranets, but we should expect more when anyone can address the network, define the necessary capabilities and use them as needed. These individuals can also sell them to others with any type of charging arrangement: charging for time or for capacity used, by content consumed, or subscription by the hour, the year or the second. And if you need a content delivery network, you can rent space on those built by others, independent of other business relationships you might have. Or you can build one yourself.

So monthly bills? Well, remember the hansom cabriolet? It's cute, but not what we need today.

What other business processes may soon become outdated? Let us know on Twitter.

More Stories By Esmeralda Swartz

Esmeralda Swartz is VP, Marketing Enterprise and Cloud, BUSS. She has spent 15 years as a marketing, product management, and business development technology executive bringing disruptive technologies and companies to market. Esmeralda was CMO of MetraTech, now part of Ericsson. At MetraTech, Esmeralda was responsible for go-to-market strategy and execution for enterprise and SaaS products, product management, business development and partner programs. Prior to MetraTech, Esmeralda was co-founder, Vice President of Marketing and Business Development at Lightwolf Technologies, a big data management startup. She was previously co-founder and Senior Vice President of Marketing and Business Development of Soapstone Networks, a developer of resource and service control software, now part of Extreme Networks.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Microservices Articles
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm. In their Day 3 Keynote at 20th Cloud Expo, Chris Brown, a Solutions Marketing Manager at Nutanix, and Mark Lav...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
If your cloud deployment is on AWS with predictable workloads, Reserved Instances (RIs) can provide your business substantial savings compared to pay-as-you-go, on-demand services alone. Continuous monitoring of cloud usage and active management of Elastic Compute Cloud (EC2), Relational Database Service (RDS) and ElastiCache through RIs will optimize performance. Learn how you can purchase and apply the right Reserved Instances for optimum utilization and increased ROI.
TCP (Transmission Control Protocol) is a common and reliable transmission protocol on the Internet. TCP was introduced in the 70s by Stanford University for US Defense to establish connectivity between distributed systems to maintain a backup of defense information. At the time, TCP was introduced to communicate amongst a selected set of devices for a smaller dataset over shorter distances. As the Internet evolved, however, the number of applications and users, and the types of data accessed and...
Consumer-driven contracts are an essential part of a mature microservice testing portfolio enabling independent service deployments. In this presentation we'll provide an overview of the tools, patterns and pain points we've seen when implementing contract testing in large development organizations.
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...