Cloud Infrastructure

Commercialising the current innovations in Network technology.

Virtualisation is a key strategic direction for Network Operators and their suppliers. From SDN to NFV, 5G to IoT, every conversation is dominated by this topic.

In this maelstrom of technical activity one thing that is being under-discussed is the commercial and operating models that will exist once this network virtualisation revolution has turned a few cycles. As operators have more discussions with technology providers about widgets and wonders of whatever there is a sense that the network owners preferred end game is not clearly in focus.

Meanwhile the compute world had their revolution and we now call the result of that revolution “Cloud”.

The Configured Things perspective

Without the automation of federation in Networks that we already see with cloud providers, we can see that a virtualised or sliced  network will be just as costly to consume as its non-virtualised/non-sliced cousin.

To enable the automation of a federated application/compute/network “slice”, Configured Things addresses the fractal nature of co-operation within and across organsational boundaries, of mixed applications sharing common resource, compute, network and sensor (IoT) infrastructure.

Cloud Infrastructure will be the extension of the existing cloud compute business model that will underpin 5G, Smart Cities, IoT and more.

Network Slicing extending the revolution.

For Configured Things the emergence of cloud computing as an accepted business model is proof that diverse organisations can and will co-operate on infrastructure. An Enterprise will blithely consume virtualised resource from any number of infrastructure providers seemlesly alongside assets that they physically own. In turn the cloud provider will have thousands perhaps millions of clients controlling aspects of the cloud provider’s infrastructure, under polices that are both technical and commercial in aspect.

It is outside of the Data centre of course that the revolution is now focused. Technology companies and standards bodies in the networking space are making great progress defining the required functions. For Configured Things we see these beginnings as analagous to server virtualisation technology; it may reduce network costs but it needs something else to create a new market paradigm.

Cloud infrastructure

Fully realising Cloud Infrastructure.

Consider an Access Network provider delivering service to a Mobile Network Operator. Analagous to cloud, the Access Network should be consumed autonomously by the Mobile Operator. This automation will be regulated by a commercial and technical framework that is defined by all concerned parties within the Access Network providers organisation. Multiply this number of relationships by n and you have a model of the Smart City complexities.

Configured Things fully addresses the fractal nature of this cooperating model. By enabling the creation of trusted, diaggregated systems that react real-time to changes in state or policy we provide market scale across organisational and functional silos.

What is so smart about “Smart”?

What is so smart about “smart”?

In the fast evolving technology world, ”Smart” has come to mean many things, we have smart phones, fridges, washing machines and even cars. Yet smart, even across this spectrum of devices, has a very ambiguous application. There is a danger that smart becomes just another label to be ignored by technologists and over-used by marketing folks.

The Configured Things view of smart

So, what does smart infrastructure really look like, how do smart stadia and other smart spaces or services function differently from their non-smart cousins? To Configured Things, smart means cyber-physical systems that sense and react to their situation across all domains, social, physical, virtual and IT with respect to a policy defined by their collective owners.

In the Configured Things world, spaces and business applications and services would self-optimise their IT consumption, only provisioning the services as and when they are needed, from digital signage and service-side on-demand IPTV to IoT-data acquisition, analytical pipelines and the visualisation of results, necessary for cyber defence.

Trust is the key

Configured Things specialise in empowering the building of trust into systems. In a world that provides cyber-physical orchestration, AI-enabled organisations will thrive by having physical systems and their back ends that are pre-deployed based on prediction and allow organisational trust relationships to be honoured, providing for network slicing that delivers dynamically well configured slices from cloud to endpoint.

In the defence and security sector, imagine when it is possible for a commander or security operations manager to have full situational awareness of the evolving threat. Displays that can adapt to focus on critical information and intelligence as signals are received, processed, triaged and prioritised. Imagine the cost savings if this intelligent system only existed during the live mission or incident, systems rapidly deployed and tore down as necessary. In this environment global teams are empowered as they can freely query datasets outside of their geography as the system interprets each query with respect to the regulatory policy and renders results that are shielded by pseudaonymisation automatically.

Currently, there is much cost to the isolated physical and virtual worlds, advertisers  spend great cost on audits of their chosen venues to quantify whether ads are shown at the correct time and to what given audience. Imagine the pricing benefits if these were integrated, an audience could be measured in trustworthy multi-modal fashion based on anonymised WiFi patterns, carbon dioxide and infrared emission. Trustworthy ads placements data can be automatically recorded and robustly defended due to strong configuration assertions, whilst current draw and pixels measured on display screens is used to verify proof of play.

Actually, it is Configuration management Jim, but not as we’ve know it…

To Configured Things, trusted, reliable and pervasive configuration management, that does not just stop at IT systems, but transcends organisational trust challenges through the command and control of disaggregated systems, is the core enabling technology to empowering the future for how the world should work. A trusted, configurable world, can be a smart world.

To discuss the ideas discussed in this article,  your Smart Space or Smart Services projects, challenges or requirements please get in touch at

What’s going on at our July event at Ashton Gate Stadium, Bristol, UK?

What “tech” are we showing?

We are using our WebWindows screen management technology as a showpiece to demonstrate the Configured Things platform as a tool to curate Smart environments and systems.  The “Smarts” are provided by various IoT sensors and other “Things”  which are collectively orchestrated to affect the visualisation of the system or smart space in a multi-screen digital display environment. We will be simulating a co-operative environment where within a prototype security schema devices are potentially “owned” by different organisations and the control of these assets plus the resulting data are shared to achieve whatever the desired objective is for the overall “system”.

Should you be interested?

Yes – if IoT is not just a data collector for you – you are interested in IoT systems co-operating and creating those smarter environments or more intelligent applications.

Yes – if you are involved in projects which require – or would be enhanced – if different organisations could share control of assets and the resulting data in ways that might seem impossible to you at this time. Examples would include Smart spaces and Smart city projects but could also include next generation Service Provider wholesale/5G networks.

Yes – you have a Digital signage/display project which would benefit from a completely new approach to utilising those assets together with other IoT assets that might be available to you. Examples of this would be a City or cyber security control centre.

What’s the format of the event?

The event is really a collection of 1 to 1 meetings held over the 25th and 26th of July at Ashton Gate Stadium. Most of these meetings are already arranged and in place but we do have some free time we could accommodate meetings with folks who may be interested and available to meet us on those dates. The “event” invite is listed below but an R.S.V.P. describing your interest and availability to attend a meeting with  us should be sent to

Lastly – a clarification

Whilst we are really grateful to the team at Ashton Gate Stadium we must point out that we are being hosted at Ashton Gate Stadium only; this isn’t a validation of our technology by the stadium in any sense. Rather it is them providing us space to build a tech demo and use the venue to meet our potential clients and interested parties.