After many ambitious starts by operators hoping to build gigabit networks, the reality sets in. Building out fiber to all premises is difficult, slow, complicated and expensive. In order to achieve a reasonable ROI, many operators avoid locations that are difficult to serve, resulting in these high-speed, high-quality networks going to only a chosen few. This not only widens the digital divide but also makes the goal of a “gigabit society” difficult to achieve ...
Read the full post
These days it feels like the cloud is everywhere. We use it to store our music and to watch our movies. We host our applications in the cloud, and we expect them to be accessible always and everywhere. Lost in the ubiquity of the cloud is a very simple fact: the cloud depends on connectivity. The dependence of cloud on connectivity is obvious when you step back and ask the question: What is the cloud? A simple answer is ...
Read the full post

If you’re a network operator or a service provider, you know that the speed at which data, voice and video traffic is growing will soon swamp your existing network resources. To support that demand, and to continue to grow the network in an efficient way, you must find solutions for preserving spectrum and providing good quality of experience for the end user. But you also know that 5G isn’t far off, so it’s critical to future-proof the network investments you make today ...

Read the full post
When I was a kid, spying was something countries did to maintain the upper hand in war, trade negotiations, bragging rights and financial gain. The tools of the spy trade included listening/recording devices, super telephoto lenses, a submarine, a stylish and aloof international man or woman and, most importantly, a very fast car, plane or speed boat. At least, that’s what the James Bond movies led us all to believe ...
Read the full post
The healthcare industry has become increasingly exposed to cyberattacks. In 2015, 36% of compromised records were healthcare related, making it the number one industry for data breaches. Perhaps this should come as no surprise as confidential personal data from healthcare organizations is particularly lucrative for hackers. Criminals know it’s likely to include not only names and dates of birth but also insurance and financial information. And, thanks to the boom in cloud computing and application-based connectivity, there’s no longer one single point of entry for a hacker to access a company’s system ...
Read the full post