Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

James Donner
on 29 January 2016

Telco Demos With Juju: DataArt


Telecom operators currently need months to deploy new value added services to production. Not any more! Take a look into how DataArt is using Juju, Docker and other Webscale technologies and applying them to the telecom world. You can deploy a telecom solution in minutes, auto-scale it and change services even while a live audience is using them.

In this demo from TADsummit, watch Michael Lazar from DataArt demonstrate a teleconference on demand service that’s able to seamlessly scale on demand. As demand increases, you’ll see how new instances can be added and environments can be scaled up. The loads simulated in this demonstration include 2 million SMS messages as well as inviting the audience to dial into the conference call.

In addition to using the parameters of Juju charms to configure scaling, it’s able to reclaim resources when they’re no longer necessary. This not only allows companies to businesses to maximize their resources, but provide a return on investment.

Ready to see for yourself? You can also try this demo at home by grabbing the Juju bundle here.

We’ll also be at Mobile World Congress showing all of these exciting solutions in action and more. Get more information here!

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...