Smart cities: what are the opportunities for telcos?

There has been plenty made of the future market size of Internet of Things (IoT), and almost everyone in the telecoms industry is very familiar with numbers claiming “IoT will be worth billions by 2020”. However, it would be fair to say that the IoT market in general failed to capture the public’s imagination in […]

Data Revelations: Nominum Data Science Security Report

This inaugural security report from Nominum Data Science comes from the frontlines of the war against cybercrime, examining the most prevalent and effective malware in today’s threat landscape—including DDoS, DNS amplification and pseudo-random subdomain (PRSD) attacks. Nominum Data Science reveals the methods and mechanics behind emerging and pervasive threats, such as Locky, Necurs and Ghost Push. The team analyzes over 100 billion DNS queries every day and employs advanced techniques, including proprietary algorithms and machine learning, to give you the best insight into today’s dynamic threat landscape.

Network maintenance evolution and best practices for NFV assurance

Telecom service providers testify they are responding to pressures on their business models by changing the way in which they design, develop and deliver services. This transformation is targeting a shift from today’s legacy network operations to implementing a transparent service delivery, operations and management environment that enables customers to self-service and monitor service-level agreements (SLAs) and key performance indicators (KPIs). A key goal is to give customers the capability to activate changes and upscale, downscale or alter services on demand. This is an urgent need because operators are challenged to differentiate to increase revenue in the face of slower growth and greater competition.

Internet of Things; Why Location Matters

The ‘Internet of Things; Why Location Matters’ ebook is essential reading for understanding this potential, from management of mobile industrial assets and crowdsourcing air quality monitoring to targeted mobile advertising, smarter refuse collection and the Smart Home. It is an essential guide for telecommunications businesses to understand how to leverage the location information that will be the key to realising potential revenue streams from the IoT.

The Rise of Dynamic Malware: Using Data Science to Prevent Cyberthreats

In the past year, cybercrime has skyrocketed as malware authors continue to gain sophistication. From the front lines of the cybercrime war comes a new white paper that shares analysis from Domain Name System (DNS) data inspections to shed new light on methods to reduce cybercrime.

Visual Guide to DNS Use Cases

This visually stunning guide provides 34 ways DNS can be used by providers to enable a safer and more personalized experience for Internet subscribers. Learn how others in the industry are leveraging their existing DNS infrastructure investment to achieve amazing results.

Accelerating Digital Transformation for Service Providers

Competitive pressures are mounting for service providers, making digital transformation an urgent imperative. This paper analyzes the state of the industry and offers a path for providers to transform in order to meet the ever-increasing needs of today’s subscriber.

Next generation enterprise service delivery – what do service providers need?

With growing emphasis on new data-consuming trends in the enterprise space, such as M2M, IoT, and cloud services operators are being faced with the challenge of how to not only manage the delivery of a new era of services, but to also create new and innovative solutions capable of supplying perennial connectivity and 100% reliability to customers.

Harnessing the IoT opportunity

Operators will prove integral to any and all success achieved by the internet of things (IoT), and operators need to prepare to manage the explosion in traffic brought about by the IoT revolution.

33 live deployments which prove how NFV has crossed the chasm

This Telecoms.com Intelligence whitepaper, in association with Intel, explores the 33 live deployments of NFV in 2015. It also advises on the primary areas being targeted for network functions virtualization and provide three in-depth case studies and exclusive comment from operators explaining their thoughts behind live NFV.

Begin monetising SDN & NFV today

Software-defined networking and network functions virtualization have heralded in a new era of possibility for operators in a telecoms industry becoming progressively more fixated on delivering diverse, converged and cloud-based services. While SDN and NFV certainly have potential, it’s the orchestration of virtual services that will make the potential of virtualization a more tangible reality. […]

Fighting the threat of SIM boxes to A2P SMS revenues

It has long been acknowledged that traditional operator revenue streams are under threat, particularly person-to-person SMS services. Application-to-person (A2P) services, however, are positively thriving, and are forecast to for the next three years at least. Enterprise organisations are increasingly turning to SMS as a means of communicating more directly and intimately with its customers as part of a multi-channel experience.

Tackling the growing threat of DDoS in telecoms

In a digital age, for which telecoms service providers are the life-blood, modern consumers are perennially connected to internet services of one form or another. Be it online or mobile banking, video-on-demand, social media, music streaming services or live news aggregators; large enterprise organisations and telecoms companies are under pressure like never before to maintain a 24 hour a day service availability.

How Ubuntu OpenStack makes the cloud work for telcos and service providers

This ebook explains how Ubuntu OpenStack can help telcos and other providers to deliver cloud-based services to both internal and external customers successfully. If you’re involved in technology, business operations or service design in any organisation that fits that description, this ebook is for you. Rather than going into hands-on technical detail, it offers a valuable overview of the tools that make Ubuntu OpenStack so powerful and – importantly – an outline of their benefits in the real world.

How can smartphones be more powerful AND more efficient?

At MediaTek, we ask always ourselves how smartphones chipsets can offer higher performance while using less power. Generation-after-generation, our systems-on-chip contribute to better user experiences, slimmer device designs and more advanced multimedia features. When we introduced CorePilot™, our innovative technology to assign tasks to each of the processor’s cores optimally, we knew it would enable […]

Monetize IoT Opportunities NOW with Managed IoT Services

The demand for Internet of Things (IoT) services is expected to explode in the next few years. Communication Services Providers (CSPs) must act now if they want to make IoT services a great capitalization opportunity rather than yet another burden on the capacity of their network. Delivering IoT and M2M services requires more than connectivity […]

Polls

Should privacy be treated as a right to protect stringently, or a commodity for users to trade for benefits?

Loading ... Loading ...