Skip to main content
  1. Blog
  2. Article

James Donner
on 29 January 2016

Telco Demos With Juju: DataArt


Telecom operators currently need months to deploy new value added services to production. Not any more! Take a look into how DataArt is using Juju, Docker and other Webscale technologies and applying them to the telecom world. You can deploy a telecom solution in minutes, auto-scale it and change services even while a live audience is using them.

In this demo from TADsummit, watch Michael Lazar from DataArt demonstrate a teleconference on demand service that’s able to seamlessly scale on demand. As demand increases, you’ll see how new instances can be added and environments can be scaled up. The loads simulated in this demonstration include 2 million SMS messages as well as inviting the audience to dial into the conference call.

In addition to using the parameters of Juju charms to configure scaling, it’s able to reclaim resources when they’re no longer necessary. This not only allows companies to businesses to maximize their resources, but provide a return on investment.

Ready to see for yourself? You can also try this demo at home by grabbing the Juju bundle here.

We’ll also be at Mobile World Congress showing all of these exciting solutions in action and more. Get more information here!

Related posts


Massimiliano Gori
30 March 2026

How to Harden Ubuntu SSH: From static keys to cloud identity

Cloud and server Article

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, ...


Lech Sandecki
27 March 2026

The “scanner report has to be green” trap 

Security Article

Stability, backports, and hidden risks of the bleeding edge In the modern DevSecOps world, CISOs are constantly looking for signals in the noise, and the outputs of security scanners often carry a lot of weight. A security scan that returns a “zero CVE” report often unlocks promotion to production; a single red flag can block ...


Massimiliano Gori
27 March 2026

Modern Linux identity management: from local auth to the cloud with Ubuntu

Cloud and server Article

The modern enterprise operates in a hybrid world where on-premises infrastructure coexists with cloud services, and security threats evolve daily. IT administrators are tasked with a difficult balancing act: maintaining traditional local workflows while managing the inevitable shift toward cloud-native architectures. Identity has emerged ...