Telco Demos With Juju: DataArt

James Donner

on 29 January 2016

This article is more than 10 years old.


Telecom operators currently need months to deploy new value added services to production. Not any more! Take a look into how DataArt is using Juju, Docker and other Webscale technologies and applying them to the telecom world. You can deploy a telecom solution in minutes, auto-scale it and change services even while a live audience is using them.

In this demo from TADsummit, watch Michael Lazar from DataArt demonstrate a teleconference on demand service that’s able to seamlessly scale on demand. As demand increases, you’ll see how new instances can be added and environments can be scaled up. The loads simulated in this demonstration include 2 million SMS messages as well as inviting the audience to dial into the conference call.

In addition to using the parameters of Juju charms to configure scaling, it’s able to reclaim resources when they’re no longer necessary. This not only allows companies to businesses to maximize their resources, but provide a return on investment.

Ready to see for yourself? You can also try this demo at home by grabbing the Juju bundle here.

We’ll also be at Mobile World Congress showing all of these exciting solutions in action and more. Get more information here!

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

Finding the blind spot: How Canonical hunts logic flaws with AI

AI is accelerating and improving how security engineers find and fix vulnerabilities. A new tool developed and used at Canonical, called Redhound, has already...

Fragnesia Linux kernel local privilege escalation vulnerability mitigations

A local privilege escalation (LPE) vulnerability affecting the Linux kernel has been publicly disclosed on May 13, 2026. The vulnerability does not have a CVE...

Rethinking BYOD security: protecting data without trusting devices

BYOD (bring your own device) has always looked better on paper than it does in real life. The promise is clear: let people use the gadgets they already own....