My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |

 

This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


 

Twitter reports better than expected user growth, shares riseOpen in a New Window

(Reuters) – Shares of Twitter Inc jumped on Wednesday after the microblogging service reported better-than-expected user growth in the first quarter, although its revenue fell for the first time. The surprising acceleration, which Twitter attributed to new features and heightened user interest in political news, followed several quarters of stalled user growth that raised questions […]

 

The IMS World Forum – launchpad for telco innovationOpen in a New Window

Jan Rijk Vonk is Director of Innovation Strategy at KPN, and is a speaker at the forthcoming IMS World Forum, 23-24 May in Madrid. What we wanted to know is why IMS seems suddenly to have come of age, and gone mainstream. “It is as simple as the fact that legacy systems are not flexible, […]

 

Musk and Zuckerberg: not mad, just wildly optimistic on brain interfaceOpen in a New Window

Elon Musk and Mark Zuckerberg want to connect your brain to your computer and your Facebook page. The problem isn’t the technology but their timelines. We’ve heard in the past week plans by Elon Musk and Mark Zuckerberg to connect your brain to your computer and your Facebook page, respectively. Which would normally get you laughed […]

 

News highlights – 25 AprilOpen in a New Window

News highlights for 25 April Uber to launch flying taxis by 2020 (Reuters) – After upending the taxi market with its ride-hailing service, Uber Technologies Inc is now aiming for the skies with its flying taxis. The company expects to deploy its flying taxis in Dallas-Fort Worth, Texas, and Dubai by 2020. Read more… Swedish operators […]

 

Jack Ma: the internet should be a utility to help fight povertyOpen in a New Window

GENEVA (Reuters) – Alibaba Executive Chairman Jack Ma said on Tuesday the Internet should be a utility available to the whole world, putting his weight behind a U.N. call for e-commerce to boost developing economies and help fight poverty. Ma, who advises the United Nations trade and development agency UNCTAD on small business and young […]

 

Hyundai app lets their cars be started remotely, possibly stolenOpen in a New Window

TORONTO (Reuters) – Software vulnerabilities in a Hyundai Motor Co app that lets a car be started remotely made the company’s vehicles susceptible to theft from high-tech thieves for three months before the company fixed the bug in March, a cyber security firm said on Tuesday. Hyundai introduced a flaw in a Dec. 8, 2016 […]

 

Media: what to do when TV viewing drops 55% in one yearOpen in a New Window

The percentage of consumers who prefer watching TV shows on television sets plummeted by 55% over the past year, from 52% to 23%, according to findings from Accenture’s 2017 Digital Consumer Survey, signalling an accelerating shift in digital video market consumer behavior. The global online survey of 26,000 consumers in 26 countries reports that consumers […]

 

Our security blog is about to be transformed…Open in a New Window

Someone using a tabletChange is on the horizon. Our security blog is getting a fresh look and new functionality. Here’s what you need to know. This blog has always been a place where you can get the latest news, as well as views and insights from those working in the industry. And that’s not going to change. What […]

 

Hackers Matter: Issue two — the disclosure game.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. You can patch known bugs in your system, but what about the ones you don’t know about? Here’s why ‘the disclosure game’ is vital to your cyber security. An eventful trip to Troopers. I’m just back from Troopers, the best hacker conference in the world. This year, it celebrated […]

 

Securing applications with blockchain: Issue one — an introduction to blockchain.Open in a New Window

chip and PIN paymentBlockchain is the big new idea in tech, but is it worth the hype? Discover how it actually works (and why it matters to the security of your applications).   Dr Jonathan Tate, Solution Architecture Lead, Security CTO Team       Dr Joshua J Daniel, Senior Researcher, Security Futures Practice.     Introducing blockchain. […]

 

Mind the security gap with effective endpoint protection.Open in a New Window

Rob Daniels, General Manager of Security Portfolio Strategy, BT.By Rob Daniels, General Manager of Security Portfolio Strategy, BT. It used to be simple for organisations to protect devices at work. But here’s how mobile working has made endpoint security more critical than ever. Securing a more mobile world. You’re probably reading this on a mobile device or a laptop. That’s the way we […]

 

Discover how DMARC keeps spoofed email addresses out of your inbox.Open in a New Window

Peter Negus, Solutions Architect, BT.By Peter Negus, Solutions Architect, BT. Discover how Domain-based Message Authentication, Reporting and Conformance (DMARC) improves security and keeps spoofed email addresses out of your inbox.   Spoofing emails and cyber security.   It’s 6pm on Friday and you need to go home. An email from what appears to be security@bt.com arrives in your inbox. […]

 

Getting your security ready for GDPR.Open in a New Window

Jose Francisco Pereiro Seco, Head of Data Security Europe, BT.By Jose Francisco Pereiro Seco, Head of Data Security Europe, BT. Digital transformation unlocks huge potential — and raises significant data protection and privacy risks. Here’s what the GDPR means for your security. Regulatory change for a digital world: GDPR. On 14 April 2016, the European Parliament adopted a new regulation that will replace the […]

 

Make sure you’re prepared for GDPR.Open in a New Window

Guus van Es, General Manager, Security Consulting, BT.By Guus van Es, General Manager, Security Consulting, BT. BT’s security consultants have long advised customers to design security and data protection into their core processes. Innovation and security are two sides of the same coin. This combined ‘outside-in’ and ‘inside-out’ approach to security makes sense in a threat environment that is changing so rapidly. […]

 

Keep your cyber security afloat in a sea of threats.Open in a New Window

Deborah Moir, Security Consultant, BT.By Deborah Moir, Security Consultant, BT. Securing your network against cyber crime is a bit like trying to keep water out of a leaky boat. Here’s the process you need, if you want to stay afloat. A dangerous situation. Imagine you’re at sea and the weather’s bad. You and a small crew are piloting a […]

 

Power ahead: manage risks and embrace digital disruption.Open in a New Window

An aeroplaneBy Ramy Houssaini, Vice President of Security Europe, BT. Our digital world is thriving. Rapid innovation is radically changing the technology and cyber-risk landscape. New business models relying on cloud and mobile environments are continuously dissolving the traditional perimeter, scattering data everywhere and creating new exposures. Digital trust is rapidly emerging as the new competitive frontier […]

 

Hackers matter: Issue one — hackers wanted.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. ‘Hacker’ is an emotive term today. But, go back to its roots, and there’s a clear case for teaching, mentoring and developing hacker skills. We all need hackers. I’m going to start with a provocative statement: hackers are a national resource and should be encouraged, cultivated and embraced. There, […]

 

How to achieve the ‘Fort Knox’ of cyber security.Open in a New Window

Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT.By Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT. The City of London took its expertise in fighting digital crime to Asia, exploring how the right cyber defences can offer a digital version of Fort Knox. Protecting the cyber equivalent of Fort Knox. As a world-leading hub of digital enterprise, the City […]

 

Security-enabled business: Software-defined networks.Open in a New Window

Sam Cater, Future Cyber Capabilities Specialist, BT.By Sam Cater, Future Cyber Capabilities Specialist, BT. The development of SDN in recent years has made it an incredibly useful technology, but it comes with an unfortunate side-effect… How SDN works. A software-defined network (SDN) is essentially a TCP/IP stack which is driven by a software application as opposed to the operating system’s kernel. […]

 

Can a data breach be a good thing?Open in a New Window

By Rob Partridge, Head of the BT Cyber Security Academy. Big security breaches gain headlines, but organisations often fail to learn from them. Here’s how our apprentices help us avoid a car crash for cyber security. Failing to learn the right lessons. Rubbernecking; we’ve all been there. Driving along the motorway, and suddenly the traffic […]

 

Security-enabled business: Cloud Access Security Brokers.Open in a New Window

datacentreMore organisations are aware of productivity-boosting cloud applications, but few know how to use these securely. That’s where Cloud Access Security Brokers can help. Clouds. Visibility, nil. As organisations seek to benefit from the flexibility, convenience and cost-efficiency of the cloud, security is expanding out of the data centre. This leaves security decision-makers without visibility […]

 

Humans Matter: Issue four – Are you a maestro?Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K. Fite, Account CISO, BT. Recent technology conferences have shown that orchestration of robotic workforces has some way to go to replace the human touch. Bryan K. Fite explores why. No one has ‘the answer’. As I write this blog, I’m sitting in a small sushi joint at the top of a hill […]

 

Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]

 

Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]

 

An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013

 

18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]

 

BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now

 

Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]

 

Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]

 

Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]

 

Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]

 

It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
 
Membership Software Powered by YourMembership  ::  Legal