Cable Access’s Virtualized Future Has Arrived

Multi Channel | February 10, 2020

The cable access technology business’s new, virtualized era has arrived for vendor Harmonic, which reported a 78% year-over-year spike in its fourth-quarter cable access revenue, to $43 million, driven by its CableOS software product. San Jose-based Harmonic also touted two new but unspecified Tier 1 cable operator clients for CableOS, which converts the formerly hardware-intensive converged cable access platform (CCAP) of the typical cable hybrid fiber coaxial network into a virtualized software-based architecture. CommScope, which acquired Arris last year, Cisco Systems and Casa Systems, respectively, led the old paradigm of supplying CCAP and cable modem termination system (CMTS) hardware.

Spotlight

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.


Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Rubrik is a cybersecurity company, and our mission is to secure the world’s data. We pioneered Zero Trust Data Security™ to help organizations achieve business resilience against cyberattacks, malicious insiders, and operational disruptions. Rubrik Security Cloud, powered by machine learning, delivers data protection and cyber resilience in a single platform across enterprise, cloud, and SaaS applications. It helps organizations uphold data integrity, deliver data availability that withstands adverse conditions, continuously monitor data risks and threats, and restore businesses with their data when infrastructure is attacked.

Resources