My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |


This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


Make sure you’re prepared for GDPR.Open in a New Window

Guus van Es, General Manager, Security Consulting, BT.By Guus van Es, General Manager, Security Consulting, BT. BT’s security consultants have long advised customers to design security and data protection into their core processes. Innovation and security are two sides of the same coin. This combined ‘outside-in’ and ‘inside-out’ approach to security makes sense in a threat environment that is changing so rapidly. […]


Why now is the perfect time to consider the MVNO opportunityOpen in a New Window

Becoming an MVNO today is a very different proposition from 10 years ago. Then it was about offering a cheaper service or providing better value than the network operator you were chained to. Virgin was perhaps the only company that realised that it could sell on brand. And it did so very well. The industry […]


The European Commission consults on FinTech regulationOpen in a New Window

The European Commission wants to create a special regime to attract FinTech companies in Europe and help the old continent compete globally on this promising new market, EU sources told The Commission is considering a single EU-wide licence allowing tech companies in the financial services sector to operate across Europe. Part of the plan to boost […]


Toshiba is planning for Westinghouse to file for bankruptcyOpen in a New Window

TOKYO (Reuters) – Japan’s Toshiba Corp has informed its main lenders it is planning for U.S. nuclear unit Westinghouse Electric Co LLC to file for bankruptcy on March 31, people briefed on the matter said on Friday. Toshiba expects a Chapter 11 filing for Westinghouse would expand charges related to the U.S. unit in the […]


Distributed ledger technology and the democratisation of financeOpen in a New Window

The emergence of startup hubs and FinTech trends like digital currencies and distributed ledger technology are changing the balance of the world’s finance hubs towards more democratic finance services that represent everyone – and that’s a good thing. We are witnessing the shift in the geopolitical environment and how machines can change institutional structures. At […]


News highlights – 23 MarchOpen in a New Window

News highlights for 23 March Amazon wins $1.5 billion fight with the IRS (Reuters) – Inc on Thursday won a more than $1.5 billion tax dispute with the Internal Revenue Service over transactions involving a Luxembourg unit more than a decade ago. Read more… Senate votes to repeal Obama privacy regulations WASHINGTON (Reuters) – […]


Twitter is considering a subscription model for businessOpen in a New Window

SAN FRANCISCO (Reuters) – Twitter Inc is considering whether to build a premium version of its popular Tweetdeck interface aimed at professionals, the company said on Thursday, raising the possibility that it could collect subscription fees from some users for the first time. Like most other social media companies, Twitter since its founding 11 years […]


YouTube strategy threatened by advertiser revoltOpen in a New Window

(Reuters) – The decision by a handful of high-profile consumer brands to pull advertising from Google’s YouTube over offensive content could threaten the site’s long-term strategy of stealing ad dollars from television, analysts and ad industry professionals said Thursday. The immediate financial impact of the controversy is likely to be limited, in part because a […]


Keep your cyber security afloat in a sea of threats.Open in a New Window

Deborah Moir, Security Consultant, BT.By Deborah Moir, Security Consultant, BT. Securing your network against cyber crime is a bit like trying to keep water out of a leaky boat. Here’s the process you need, if you want to stay afloat. A dangerous situation. Imagine you’re at sea and the weather’s bad. You and a small crew are piloting a […]


Power ahead: manage risks and embrace digital disruption.Open in a New Window

An aeroplaneBy Ramy Houssaini, Vice President of Security Europe, BT. Our digital world is thriving. Rapid innovation is radically changing the technology and cyber-risk landscape. New business models relying on cloud and mobile environments are continuously dissolving the traditional perimeter, scattering data everywhere and creating new exposures. Digital trust is rapidly emerging as the new competitive frontier […]


Hackers matter: Issue one — hackers wanted.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. ‘Hacker’ is an emotive term today. But, go back to its roots, and there’s a clear case for teaching, mentoring and developing hacker skills. We all need hackers. I’m going to start with a provocative statement: hackers are a national resource and should be encouraged, cultivated and embraced. There, […]


How to achieve the ‘Fort Knox’ of cyber security.Open in a New Window

Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT.By Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT. The City of London took its expertise in fighting digital crime to Asia, exploring how the right cyber defences can offer a digital version of Fort Knox. Protecting the cyber equivalent of Fort Knox. As a world-leading hub of digital enterprise, the City […]


Security-enabled business: Software-defined networks.Open in a New Window

Sam Cater, Future Cyber Capabilities Specialist, BT.By Sam Cater, Future Cyber Capabilities Specialist, BT. The development of SDN in recent years has made it an incredibly useful technology, but it comes with an unfortunate side-effect… How SDN works. A software-defined network (SDN) is essentially a TCP/IP stack which is driven by a software application as opposed to the operating system’s kernel. […]


Can a data breach be a good thing?Open in a New Window

By Rob Partridge, Head of the BT Cyber Security Academy. Big security breaches gain headlines, but organisations often fail to learn from them. Here’s how our apprentices help us avoid a car crash for cyber security. Failing to learn the right lessons. Rubbernecking; we’ve all been there. Driving along the motorway, and suddenly the traffic […]


Security-enabled business: Cloud Access Security Brokers.Open in a New Window

datacentreMore organisations are aware of productivity-boosting cloud applications, but few know how to use these securely. That’s where Cloud Access Security Brokers can help. Clouds. Visibility, nil. As organisations seek to benefit from the flexibility, convenience and cost-efficiency of the cloud, security is expanding out of the data centre. This leaves security decision-makers without visibility […]


Humans Matter: Issue four – Are you a maestro?Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K. Fite, Account CISO, BT. Recent technology conferences have shown that orchestration of robotic workforces has some way to go to replace the human touch. Bryan K. Fite explores why. No one has ‘the answer’. As I write this blog, I’m sitting in a small sushi joint at the top of a hill […]


How to tackle endpoint security gaps caused by mobile working.Open in a New Window

By Rob Daniels, General Manager of Security Portfolio Strategy, BT. Our webinar explores how employees are more productive with the freedom to work remotely — but their devices put you at risk of an endpoint infection. The cost of mobile security. Today, it’s odds on that the majority of people who read this will do […]


How digital mobility can boost your organisation.Open in a New Window

Paul Crichard, Head of Technical Strategy, BT.By Paul Crichard, Head of Technical Strategy, BT. Security’s often regarded as an obstacle rather than an enabler. Paul Crichard explains why it should always be first when it comes to new technology. Taking the mystique out of tech. Technology can sometimes be magic and mystery. The Internet of Things, cloud technology, Big Data. These […]


Three tips to help you comply with PCI DSS requirements.Open in a New Window

Tini Schuurmans, Principal Security Consultant, BT.By Tini Schuurmans, Principal Security Consultant, BT. Discover Principal Security Consultant Tini Schuurmans’ three tips for ensuring your business is compliant with PCI DSS. Complex card compliance. Protecting cardholder data is an important part of creating trust between you and your customers. But it’s not just about delivering a better service. The Payment Card Industry […]


A ticking clock for your cyber security.Open in a New Window

Bas de Graaf, Head of Product Management — Security Consulting, BT.By Bas de Graaf, Head of Product Management — Security Consulting, BT. You have just one year and a few months to prepare your organisation for the new EU Data Privacy Regulation. Here’s what you need to know. Setting the cyber scene. The world is undergoing a digital transformation. Smart cities, the Internet of Things […]


Security-enabled business: PCI DSS.Open in a New Window

Balendra Elangco, Chief Security Architect, BTBy Balendra Elangco, Chief Security Architect, BT. Find out why compliance with PCI DSS is good for business, particularly for small organisations. PCI DSS — ‘YATE’? Organisations that store, process or transmit payment cards are required to comply with Payment Card Industry Data Security Standard (PCI DSS). But is this yet another tick box exercise (YATE)? Far […]


Find out why cyber security is vital to digital transformation.Open in a New Window

City image from BT and Cisco digital transformation infographic on IDC's cyber security reportMost organisations around the world have ineffective cyber security, and that means they struggle to thrive in today’s digital world. Seeking a better understanding of cloud and cyber-security adoption among businesses, IDC developed the Cyber Security Proficiency Framework. This innovative new tool looks at the alignment of security objectives, business goals and cyber-defence solutions to […]


Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]


Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]


An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013


18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]


BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now


Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]


Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]


Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]


Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]


It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar

06/04/2017 » 07/04/2017
Big Data (BI) WG Meeting April 2017 Amsterdam

Jan Sonck, ProximusNewly Elected INNWG Chair
Zsolt Butyka, Magyar TelekomNewly Elected INNWG Vice Chair

Membership Software Powered by YourMembership  ::  Legal