ETSI organizes the first joint 6TiSCH/6lo (IPv6 over the Timeslotted Channel Hopping mode of IEEE 802.15.4e)/(IPv6 over Networks of Resource-constrained Nodes) Plugtests™. This event will be held from 15 to 17 July 2016 in Berlin, Germany. This event has the support of the IP6 ISG (IPv6 Internet Protocol version 6 Industry Specification Group) and of the Internet Engineering Task Force (IETF) 6lo Working Group.16:00 CEST on ETSI BrightTalk Channel, 12 July 2016
Join us for the first in a series of four webinars looking in detail at the work of ETSI's Network Functions Virtualisation NFV Industry Specification Group.
ETSI NFV ISG is in the final stage of publishing all of its Release 2 Specifications and Reports. This webinar highlights some of the fantastic Release 2 results and introduces the upcoming Release 3 work program.
Watch this webinar to get the most up-to-date plans from the NFV community and see what's coming up on the horizon.Naples, Italy, 27 JUNE - 08 JULY 2016
The Small Cell Forum, in partnership with ETSI, has organized the Small Cell LTE Plugfest 2016 from 27 June to 08 July 2016, hosted by the Telecom Italia Lab in Naples, Italy.Sophia Antipolis, France, 20-21 June 2016
The ETSI Seminar is run twice a year (June and December), to provide an intensive course on ETSI, its organization, structure, ways of working and related subjects. It is targeted at those who are new to ETSI or those who need to develop a deeper understanding of how to work effectively in ETSI.ETSI Headquarters, 13-17 June 2016
Now in its second year, the ETSI security week will consist of an IoT Security Workshop running from Monday 13 to Wednesday 15 June 2016 followed by the ETSI Technical Committee CYBER plenary meeting taking place from 15 to 17 June 2016 and the hosted AIOTI Workshop on 16 June.15:00 CEST on ETSI BrightTalk Channel, 9 June 2016
Service assurance accurately measures and reports on infrastructure (network and platform) KPIs that might affect a specific service. Although service assurance is well-understood in the traditional networking environment, applying a similar mechanism to network functions virtualisation infrastructure (NFV-I), and using principles from software-defined networking (SDN) to automatically restore service level remains a work in progress.
Webinar: ETSI Software Reconfiguration Framework for Mobile Devices – Security model for radio application distribution16:00 CEST on ETSI BrightTalk Channel, 1 June 2016
This webinar introduces the security model in ETSI's Software Reconfiguration Framework for Mobile Devices. It gives an overview of radio application distribution scenarios and related risks, describes how the model supports the regulatory framework for radio equipment exemplified by the declaration of conformity, and details the measures in place for the protection of assets.16:00 CEST on ETSI BrightTalk Channel, 31 May 2016
Register for ETSI's webinar on Next Generation Protocols – re-engineering information communications protocols for the 21st Century.
Andy Sutton, chair of ETSI's Industry Specification Group on Next Generation Protocols, will provide an overview of the aims and ambitions of this ground-breaking group. He will be joined by Richard Li, Chief Architect Future Networks, Huawei USA, and Gerry Foster, 5G Systems Architect, Institute of Communication Systems, University of Surrey, home of the 5GIC.Athens, Greece, 18-19 May 2016
The General Secretariat of Telecommunications and Post of the Hellenic Ministry of Infrastructure Transport and Networks, together with the European Telecommunications Standards Institute (ETSI) are co-organizing an International Conference on “European Approach to Standardization for a Digital Market”.09.30 CEST on ETSI BrightTalk Channel, 13 May 2016
This webinar gives an overview on ETSI's Software Reconfiguration Framework for Mobile Devices. It outlines key differences to the Software Communications Architecture (SCA), details the overall architecture including the Radio Virtual Machine concept and related interfaces, comments on the regulation framework and proposes a security approach