SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Conquering the Logical in Next-Generation Data Centers

By: Tim McElligott

The greatest logical thinker of our time said, “Logic is the beginning of wisdom, not the end.” That the words were uttered by a fictional character known the sci-fi world over as Mr. Spock should not diminish their significance; after all, they were written by a human, perhaps even Leonard Nimoy himself. But here in the 21st century, on earth, in a world of evolving computing technology, logic is often the beginning of something else: stifling complexity. Humans think of themselves as logical beings, but they are still proving to be much more adept at the physical…

» read this article

Red Herring or Real Threat? Security Gets Political

By: Becky Bracken

Is it mere coincidence that Chinese gear manufacturers ZTE and Huawei have become the focal point of what essentially looks to be a public relations feeding frenzy for members of the U.S. House Intelligence Committee at the very same time election season has reached its full-fevered, sweaty, smelly peak?Politicians running for everything from local city councils to even the most politicized, publicized national contests regularly, angrily demand “fairer” trade with China as a tool to create jobs and bolster a struggling economy…

» read this article

IT Security from Down Under

By: Paul Kenyon

While many readers will be familiar with the Department of Homeland Security in the U.S., there are similar security initiatives being planned, or already under way, elsewhere in the world. In Australia, for example, under the guidance of Prime Minister Julia Gillard and her federal team, the government is carving out something of a name for itself in the IT security arena. This development is somewhat surprising considering Australia’s relative youth and the fact that the country has around 22 million citizens — big enough to make its weight felt in international terms, but small enough to be flexible in the modern world of IT matters…

» read this article

Averting Modern Telecom Scams: Fraud Prevention in a VoIP World

By: Alex Hoffman

Telecommunications fraud is a significant concern for communications service providers. It robs carriers of revenues, consumes valuable network resources without remuneration and leads to customer disputes and churn. A 2011 Communications Fraud Control Association (CFCA) survey estimated global telecommunications fraud loss at $40.1 billion (USD), or nearly 2 percent of worldwide telecom revenues. Next-Gen Networks Are Susceptible to a Myriad of Scams Today’s telecom networks and services are susceptible to many different types of fraudulent activity…

» read this article

Mole in the Machine? Unique Security Challenges of M2M Connectivity

By: Jesse Cryderman

Anyone with a finger on the pulse of telecommunications will tell you that a seismic shift is occurring, and it’s bigger than 4G or VoLTE. This change will predominantly occur over 2G, WiMAX and Wi-Fi, and it has very little to do with customer experience management (CEM). That’s because the connected future belongs to machines, and machine-to-machine communications (M2M) will eventually outnumber human connections by a substantial margin. The applications for M2M are limitless: from vending machines to healthcare devices to home appliances and public safety systems, nearly everything that can benefit from connectivity will…

» read this article

Next Generation Firewalls: Protection and Performance

By: Patrick Sweeney

Protection and performance should go hand in hand in terms of data and network security. However, until the introduction of Next-Generation Firewalls (NGFWs) organizations often had to compromise data throughput and productivity for security. But while NGFWs are good news for business, many organizations are unaware that they have “old” firewalls, ones that are barriers to productivity but not, unfortunately, barriers to the latest security threats. A Quick History of Firewalls First-generation firewalls of the 1980s provided packet filtering based upon criteria such as port, protocol and MAC/IP address, and operated at layers 2 and 3 of the OSI model…

» read this article

Securing Next Gen 9-1-1

By: Jesse Cryderman

Few telecommunications systems are as important as the emergency response platform that effects everyone in the U.S., 9-1-1. This analog system is comprised of public-safety answering points (PSAPs) and relies on telco billing-system data to provide location information for first responders. The faster this data can be pulled and distributed to the appropriate teams, the better: swift palliative care following a serious injury improves survival rates, and fires that are suppressed early cause less personal and property damage…

» read this article

Nightmare Network Threats

By: Becky Bracken

The loyalty of your customer, your reputation, your bottom line — all can be destroyed in a matter of seconds by network security vulnerabilities. Security breaches like the all-too-common distributed denial-of-service (DDoS) attacks can overwhelm networks with fraudulent traffic and lead to service disruption. Thefts of large swaths of customer data are a real, everyday looming threat and could open up operators to extensive litigation. And worse, interception and penetration of networks have never been easier…

» read this article

SaaS Security: The Sensible Solution

By: Becky Bracken

It’s a natural evolution, really. Now that we’ve unlocked the key to flinging data all over the place — from the cloud to mobile devices and back again — the next question, naturally, is how to keep that data secure while it’s being flung far and wide. Particularly in North America, the mobile-enabled workforce is taking shape. It’s also what’s driving the BYOD frenzy. Almost every job can be made that much easier with a mobile handheld computer — and everyone has their own brand of choice…

» read this article

Security in the Unwalled Garden

By: Tim Young

Nowhere has the “walled garden” of old been less successful than in the mobile sphere. Smartphones, tablets and other mobile devices are now little traveling bazaars of widely varied apps routinely accessing device information of varying sensitivity. Nielsen reported in May that the average smartphone in the U.S. contains 41 apps, and Android and iOS apps downloaded to date both reach well into the tens of billions. It’s a wonderful thing, for the most part. I know that I would be pretty bored with my iPhone if its applications were limited to those supplied by, or even developed by, my CSP and device manufacturer…

» read this article

Communications IT News

By: Jesse Cryderman

As third-quarter reports rolled in, earnings among tier 1 CSPs in the U.S. proved a mixed bag, but one fact became clear: shared data plans have provided a big boost to bottom lines. AT&T added 200,000 fewer subs than expected but reported the strongest wireless ARPU growth in six quarters. And though wireless service revenues as a whole crept up less than 5 percent, the company reported a spike in mobile data revenue of more than 18 percent, or a full $1 billion more than in the third quarter of last year…

» read this article

November 2012 Letter from the Editor

By: Tim Young - do not use (default)

rdinarily, I like to begin these monthly letters with a quote.  Something light and pithy to sum up a given issue's theme.  It might be a little funny or maybe vaguely inspiring, but it's always designed to work with the central topic of the issue while accurately representing our editorial take on the topic…

» read this article
FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel