Why it’s too simplistic to view the edge as a destination

Deciding what and where the edge is

Already have an account?

All the information enterprises need to make informed, buying decisions. Case studies, Analyst Reports and expert industry coverage mapping the current tech for enterprise landscape.

In this Issue

How to maximise revenue from the 5G Value Plane

Report: How CSPs can better monetise their networks with 5G Value Plane

The advent of 5G will unlock new possibilities for cellular network-enabled solutions of all kinds, ranging from consumer broadband services and gaming propositions through to complex mission-critical IoT solutions and simpler low-bandwidth IoT monitoring solutions. Jim Morrish, a founding partner of Transforma Insights, explores the opportunities.

Read now

Why 5G’s value is now plain to see

With 5G now emerging as a commercial reality in some markets, much of the early activity is happening in private networks. These provide an early opportunity for service providers of various types to monetise 5G. However, as public networks add further coverage, 5G will enable an even larger number of use cases. The technology enables opportunities from selling network slices for specific functions to enabling assured experiences.

Read now

Inside the use cases that enable 5G monetisation

5G offers the potential for tailored performance for the first time and this means CSPs can focus on the value they provide for each service rather than only the network access. Enabling new forms of monetisation is the key to 5G profitability and creating a sustainable market place for 5Gdependent services.

Read now
Join our community

How to maximise revenue from the 5G Value Plane


  • Editors Overview: Why every means to monetise must be maximised
  • Analyst Report: How CSPs can better monetise their networks with 5G Value Plane
  • Interview: Why 5G’s value is now plain to see
  • Monetisation Use Cases: Inside the use cases that enable 5G monetisation
  • 5G Monetisation: How to identify the monetisation sweet spots in the 5G value chain
  • Network slicing: How will operators set the price of a network slice?

Your Details

Step 1/3

Login | Forgot your password?


Latest IoT News

Report: Edge computing will be critical for digital transformation

Technology enabled solutions are becoming ever more critical to the day-to-day operations of many enterprises. Among the most impactful technologies are artificial intelligence (AI), Internet of Things (IoT), cloud computing, and next generation communication technologies such as 5G. Edge computing may garner fewer headlines, but it is a key enabler for many solutions that utilise the emerging technologies listed above, writes Jim Morrish, a founding partner at Transforma Insights.

Read now

5G and MEC encourage edge intelligence to become pervasive

Multi-access edge computing (MEC) is coming together with the low latency mmWave connectivity enabled by 5G to make intelligence at the edge a reality that truly enables bi-directional digital conversations and gives the potential for technologies such as digital twins to be operated effectively. Here, Dheeraj Remella, the chief product officer of VoltDB, tells George Malim, the managing editor of VanillaPlus, how the challenges associated with MEC are being addressed and why, for many, once they’ve looked over the edge, there will be no going back to centralised, remote architectures.

Read now

Why low latency is vital for edge success

5G, edge computing, digital transformation, digital twins, machine learning and AI appearing together looks like a buzzword bingo. But there is a rational connection between these topics and technologies, writes Dheeraj Remella, the chief product officer at VoltDB.

Read now

Can it be safer on the edge?

Children are warned to stay away from the edge of cliffs, bridges, roads and rivers, but in computing, the edge is turning out to be one of the safer locations for hosting processing power and analysing data. Antony Savvas explores why this is the case, while also addressing the security concerns that do exist around edge computing and assessing how these are being resolved.

Read now

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.