By: Vishy Gopalakrishnan
It’s 2016. The network is on demand. Your office is mobile. The cloud is highly secure. And your smartphone may even be surgically attached at this point – sometimes, it’s hard to tell. We’ve
grown more dependent on technology for work and our personal lives. As the workforce becomes more mobile and connected, Millennials are surging into it. They’re fueling the growth of mobile
workers. Our mobile workforce should see an increase from 96.2 million in 2015 to 105.4 million in 2020. Fresh Eyes, Fresh Perspectives Don’t be afraid of those who question you…
» read this article
By: Scott St. John - Pipeline
If you think about it, service providers should be transformation experts by now. Remember, we’re talking about an industry today that was, just 20 years ago, a monopolistic,
government-controlled utility. I can’t think of any other industry that has to contend with as many monumental shifts, with such frequency, that have had such a fundamental impact on their
business. Milestones and Game Changers In the U.S., the 80’s saw the final break-up of AT&T into 8 separate, but still closely-regulated, entities: the introduction of the first consumer
wireless service and the dawn of the commercial Internet…
» read this article
By: Ilia Abramov
Mobile World Congress 2015 was a record-breaking event, with more than 94,000 attendees and 2,100 exhibitors convening in Barcelona for the tenth year in a row. As we head into this year’s
conference, a number of sessions and discussions around emerging mobile trends will all echo a resounding sentiment that reflects the conference’s theme: “Mobile is everything.” After all, mobile
technology continues to enter, dominate, underpin, partner with other industries and enterprises at an unstoppable speed…
» read this article
By: Renuka Bhalerao, Tom McQuade
Not a long time ago, in a galaxy not far away – in fact this one – small cells made their first appearance on the scene. In a 3G network, small cells were primarily used for in building
coverage where it was needed. It was an important role, but not a glamorous one. According to Stefan Pongratz, Senior Director of Carrier Economics and Mobile Radio Access Network (RAN) Market
Research for Dell’Oro Group, the business case for 3G small cells in 2016 and beyond will remain meager, with 3G small cells expected to account for less than one fifth of the small cell market by
2020…
» read this article
By: Alan Zeichick
Security standards for cellular communications are pretty much invisible. The security standards, created by groups like the 3GPP, play out behind the scenes, embedded into broader cellular
protocols like 3G, 4G, LTE and the oft-discussed forthcoming 5G. Due to the nature of the security and other cellular specs, they evolve very slowly and deliberately; it’s a snail-like pace
compared to, say, WiFi or Bluetooth. Why the glacial pace? One reason is that cellular standards of all sorts must be carefully designed and tested in order to work in a transparent global
marketplace…
» read this article
By: Steve French
Today’s connected customers expect interaction with preferred businesses to be three things: quick, easy and secure – and most importantly they want this communication to occur via mobile. As
consumers become increasingly receptive to interacting with enterprises through their smartphones, Gartner took it a step further and predicted that by 2020 customers will manage 85 percent of
their own relationships with enterprises without any human interaction at all. As we enter 2016, what does this shift in consumer mindset mean for mobile technology? Below are the biggest ways
we believe mobile will impact enterprises and their customers in 2016 – and how enterprises must adapt their mobile technology strategies to succeed with customers…
» read this article
By: Tim Young
Behold: a look at the future, from the past. “Mobile-phone companies are always trying to sell you the next big thing,” wrote Rana Foroohar in Newsweek. “Phones that can stream football
games, send you movie clips, download a new song or snap pictures are what beleaguered telecom operators hope will bring in the big bucks over the next few years.” She proceeds to discuss how
western mobile carriers should look to Asia for profitable business models. The date of that piece? October 19, 2003…
» read this article
By: Chris Piedmonte
There are clear indications that we are beginning to see the slow, certain death of cellular network-based mobile voice services. Across the globe, customers are using their mobile
devices to access data networks far more than they are to place mobile voice calls. When they do use their mobile devices for voice, many are turning to VOIP services such as Skype, Viber,
and retro-POTS gone global upstart Rebtel rather than the cellular network. Why is this happening? With the ready availability of IP connections, the improved voice and connection quality of VOIP
and the option to augment calls with multimedia messaging, live two-way video and application sharing, mobile VOIP is becoming the communication paradigm of choice…
» read this article
By: Wedge Greene
The call is received in the payment inquiry center: “What is this two hundred dollar charge on my Visa?” Pay-to-Win games are monetized by user interaction with an in-game threshold: pay a
little money and get a helper artifact or hint that enables the gamer to complete a level and advance. Most of the time these games are free to start and then maintain a low purchase threshold
to keep players involved. People start play as a way to kill time when they are bored. After all, a smart phone or mobile device is always at hand…
» read this article
By: Wedge Greene
As post-millennials live and work, they will expect everything to be networked, connectivity to be integrated, access to information immediate, and monitoring of activities real time and
continuous. International cultures amalgamate in the Internet-driven society. The IoT evolves from artifacts accompanying life to the artifacts of life.1 Academy When Kiko-Lyn was just a little
girl she was sent from her secure and timelessly Japanese urban apartment to the local shogakkou academy. Kiko-Lyn was told by her parents that this would be a great adventure…
» read this article
By: LeaAnn Carl
Automated Infrastructure Management (AIM) automates discovery and documentation of network cabling infrastructure in the data center, central office or commercial building. By adopting an AIM
solution, network administrators can streamline provisioning and monitoring of network connectivity, gain an accurate view of what is connected where in the network, reduce downtime by real-time
notification of unplanned changes and produce up-to-date reports on the state of the infrastructure. In this article, we’ll look at the definition of AIM, discuss its applications, and consider
some features to look for when choosing an AIM system…
» read this article
By: Tim Young
“My restless, roaming spirit would not allow me to remain at home very long.” - William “Buffalo Bill” Cody When I think of the most glamorous, idealized version of the American “Wild West,” my
mind goes to Buffalo Bill. He lived the iconic western experience—he was a Pony Express rider at age 14, fought in the American Civil War, and was a civilian scout during the so-called “Indian
Wars.” While not every aspect of his early adult life was above reproach when viewed through a modern lens, it’s what he did next that truly stands out as his major contribution to the myths of the
American West…
» read this article
By: Jim Schakenbach
The first month of 2016 was an active one for a variety of telecom issues, including Wi-Fi, security, and corporate acquisitions. It’s no surprise that network technology continues to evolve
and the FCC was busy addressing a number of issues regarding infrastructure and service. Let’s start with Wi-Fi. Wi-Fi changes for the better –and maybe worse Cisco got its day in court and won
after Texas-based Commil USA had brought suit against the network communications technology giant, claiming it infringed upon a Commil USA patent that enabled wireless signals to be spread over a
large area where multiple access points are needed…
» read this article