Home

Context-Aware Identity Management: The Who, What, Where, When and How

In the age of Bring Your Own Device (BYOD), users increasingly want the flexibility to access both their business-critical applications and personal applications anywhere, anytime and on multiple devices.  This increased mobility — combined with the fact that many applications are emerging that cross multiple industry sectors or domains — requires authentication and authorization processes beyond single sign-on capabilities.  Furthermore, the continued growth of sophisticated connected devices is creating an abundance of contextual information available to networks. The ability to effectively collect, manage and analyze this information is driving the development of new solutions in the area of Context-Aware Identity ...
Read More

The Role of Artificial Intelligence in Telecom

Artificial Intelligence and machine learning have long been associated with science fiction movies, with no better example than 2001: A Space Odyssey and Hal the computer (“I’m sorry Dave, I am afraid I can’t do that”). But what exactly is Artificial Intelligence (AI)? In its simplest form it is the automation of tasks or functions which otherwise require human intelligence to execute. Many people may be surprised to learn that AI is already widely used in their day-to-day activities through digital voice assistants such as Amazon’s Alexa or Google Home.  AI enables users to interact with their services and devices ...
Read More

Understanding the Value of Distributed Ledger/Blockchain Innovation in the ICT Industry

There is hardly a day when news related to cryptocurrencies such as Bitcoin does not make headlines.  But beyond digital currencies, the applicability of distributed ledger and blockchain is finding its way into a number of different industries including telecommunications. Distributed ledger technology (DLT) is a shared database that is spread across several nodes or computing devices. Each node replicates and saves an identical copy of the ledger to enable open and trusted exchanges over the Internet.  Since it can exist without a centralized authority or server managing it, data quality is maintained through database replication and computational trust that ...
Read More
5G Functional Split: CU, DU and RRU

What the Haul?

5G is coming, and the pipes are getting fat. Please put a penny in the operator's hat. The standards bodies defining 5G services are having a fine old time dreaming up more and more new uses for the 5G mobile network, from ultra high-speed mobile broadband through to integrated transport networks and autonomous vehicles, connected wearables, mobile healthcare, sensor networks, container tracking, and wireless factory automation. These all sound great, but you need a network to connect all of these services.  They all need very different performance and quality of service attributes.  Some services need high bit rates, some low ...
Read More

Subscriptionless Devices Offer Potential Revenue Opportunity for Network Operators

There is no ignoring the rapid proliferation of connected devices, particularly those associated with the Internet of Things (IoT).  The IoT is the inter-networking of objects, both physical and virtual, that collect and share data.  IoT objects can range from simple sensors that tell you when to water your plants to sophisticated devices enabling driverless cars. All of these devices — forecast to number in the billions within a few years — rely on the network for sharing data. Occasional data needs? No need for costly subscriptions Today’s fixed-cost networks are built and optimized for stable, predictable, and high-value subscriptions.  ...
Read More
Loading...