Backhaul has become a strategic concern for ISPs – especially mobile ISPs – in recent years, where historically it has often been more a tactical concern.
There are several reasons, which are related to the ways devices and apps are used by end users. Smartphones now represent hundreds of millions of active devices, all able to connect to Wi-Fi hotspots. Read the full post
A few weeks ago celebrity couple Gwyneth Paltrow and Chris Martin announced their plans to consciously uncouple (in plain language: separate). While I personally found this an odd way to describe the demise of a marriage, it did seem to made perfect sense to describe the state of Telecommunications.
Isn’t cord-cutting really conscious uncoupling? I am in a relationship with my broadband and entertainment provider, but I have decided that I am no longer happy. As such, I consciously uncouple my entertainment, while maintaining my broadband relationship. Read the full post
Another day, another raft of emails from online service providers prompting me to update my passwords. My inbox currently resembles a triage unit trying to clamp the impact of Heartbleed. Both professionally and personally, I’m receiving email after email on the topic. In many respects, it’s a timely wake-up call to the many millions of people still using the same childhood password for all their online services. It’s also a prescient reminder about the vulnerability of our data and the networks we depend so heavily upon.
Over the past few months, I’ve spent a lot of time talking to experts about network security, specifically in regards to data transport. With almost every discussion, I found one thought repeatedly ringing out like a clarion call – how can networks be so vulnerable? And I’m not referring to just a few networks here and there, I’m talking about an enormous number on a global scale. These networks often belong to businesses that are dependent upon the integrity and safety of their mission-critical data. Businesses that would suffer enormous financial losses if their networks were found to be susceptible to security breaches. Read the full post
You may or may not take your high-speed fiber connection for granted, depending on how much trouble it took to get it. If you look behind the curtain, local and long haul fiber optic connections are run in some pretty predictable places, with a few surprises thrown in for good measure. Knowing where and how your high speed connections are routed can provide insight both into the nature of the arcane business of rights-of-way and (more importantly) the ability to be aware of when and how service can be interrupted.
If you are in a relatively new building in an office park, the “last mile” fiber was more than likely installed during construction and brought to a central office or similar central service point for routing onto a long haul network. Everyone thinks of fiber as something trenched and buried in the ground, but there’s a surprising amount of fiber on Ye Olde Telephone Poles. The phone companies like poles because they are already in place and don’t have to dig up the ground or result to odd tricks with plumbing and pipes and conduit. In some places, you might find fiber pulled through sewer pipes since every building has that sort of access point. Read the full post
When you attend telecom conferences as part of your day job as I do, you are frequently subject to the biggest trending spook acronym in the industry: OTT. OTT stands for Over the Top, a rather awkward (in my opinion) denomination for market players who use the Internet (which stands ‘above’ the physical network of telecom operators, at least in the OSI stack) to offer services directly to the telecom operators’ customers.
I don’t like the acronym OTT, at least as it’s commonly used. For one thing, as my friend and fellow analyst Dean Bubley says, if content and application providers are Over the Top as seen from the network operator, does that mean that the network operators are Under the Bottom as seen from the content and application providers? More importantly though, using a (gross simplification of) a delivery mechanism to describe a type of players is dangerous. When Telefonica launches an app (called Tu Me) to enable VoIP and messaging on smartphones, it’s also delivering a service ‘Over the Top’. That is why I prefer to reserve the term for the delivery mechanism and distinguish as market players the Network Operators (Orange, AT&T, Telefonica…) and the Online Service Providers (Skype, Google, Dropbox…) Read the full post