My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |


This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


Prioritising your network security during a business restructure.Open in a New Window

Noble Group logoDuring a significant realignment of its worldwide infrastructure, Hong Kong headquartered Noble Group benefited from the inbuilt flexibility of its contract with BT. After helping to manage the transition, BT now assists Noble Group in maintaining the highest standards of network security through a comprehensive suite of BT services — including a managed firewall, threat […]


Big data, Twitter and sentiment analysis will determine insurance premiumsOpen in a New Window

ZURICH (Reuters) – When people take to Twitter to comment on the great evening they enjoyed with good food and wonderful friends, reducing their monthly insurance bill is probably the last thing on their mind. But such tweets could help insurers to price premiums for individuals, with research suggesting a direct link between positive posts […]


News highlights – 23 OctoberOpen in a New Window

News highlights for 23 October Two-wheel drive: China tech giants bet on ‘Uber for bikes’ in hunt for next unicorn HONG KONG (Reuters) – China’s tech industry giants are sloughing hundreds of millions of dollars into what they’re betting will be the country’s next big internet craze – ‘Uber for bikes’.  A symbol of China’s […]


Banks complete first cross-border transaction using multiple blockchainsOpen in a New Window

SYDNEY (Reuters) – The first cross-border transaction between banks using multiple blockchain applications has taken place, Commonwealth Bank of Australia and Wells Fargo & Co said on Monday, resulting in a shipment of cotton to China from the United States. Australian cotton trader Brighann Cotton Marketing bought the shipment bound for the port city Qingdao […]


AT&T to pay $85 billion for Time Warner – content plus deliveryOpen in a New Window

NEW YORK (Reuters) – AT&T Inc said on Saturday it agreed to buy Time Warner Inc for $85.4 billion, the boldest move yet by a telecommunications company to acquire content to stream over its network to attract a growing number of online viewers. The biggest deal in the world this year will, if approved by […]


Disagreement over best equipment for self-driving carsOpen in a New Window

DETROIT/SAN FRANCISCO (Reuters) – Tesla Motors Inc’s decision to equip all of its vehicles with self-driving hardware has intensified competition among rival camps of technology and auto companies over what equipment will be on board cars of the future. Tesla’s self-driving system will rely on cameras and radar sensors — but not lidar, the laser […]


75 policy and charging use cases, and countingOpen in a New Window

When you review a booklet that has a big number in its title, there is, surely, a little bit of you that starts humming familiar songs. In this case, ‘75 Ways Policy and Charging Can Boost Your Business’ became ‘50 Ways to Leave Your Lover’ followed, slightly alarmingly, by ‘one million bicycles in Beijing’. Then, […]


Managing depression: there’s even an app for that!Open in a New Window

(BPT) – Chances are, if you haven’t been personally affected by depression, you know someone who has. Depression is one of the most common mental disorders in the United States, affecting millions of people every year. In fact, an estimated one in 15 adults (6.7 percent) experiences at least one major depressive episode in any […]


Humans Matter: Issue one — The Internet of Dangerous Things.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K. Fite, Global Innovation Product Manager, BT Assure. Your people could be the biggest asset to your security or its biggest liability. Find out why humans matter when it comes to protecting your information. An eventful summer in security. Recently, I’ve been reflecting on the various events I’ve participated in over the last […]


Tip three — invest deeply in analytics; move to predictive vs. reactive.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the third of his ten top tips for keeping your data, and organisation, secure. Everyone involved in security today deals with a tsunami of data. It’s easy to be overwhelmed by the sheer amount of operational telemetry data […]


Ten cyber security essentials for digital organisations.Open in a New Window

BT and Cisco paper imageIt’s clear that cyber security enables better business in a digital economy, and here we’ll explain how you can protect your organisation more effectively. Ten tips for better cyber security. In our research paper with Cisco, we pooled our extensive expertise and devised a list of ways that any organisation can use to improve its […]


How we gave De Beers a gem of a communications solution.Open in a New Window

De Beers logoSecurity is a huge challenge for global organisations. Here’s how we keep diamond miner, De Beers’ data safe from the cyber criminals. A gem of a communications solution. Working across 28 locations worldwide, with many so remote that they can only communicate via satellite or microwave, De Beers needed a service provider that could rise […]


Tip two — broaden your ‘identify and protect’ mindset to include ‘detect, respond and recover’.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the second of his ten top tips for keeping your data, and organisation, secure. Currently, most cyber security investment is put into the perimeter — this is the ‘identify and protect’ mindset. Think firewalls, endpoint security — basically […]


Three ways to take the fight to the cyber criminals.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO, BT Security. Building your cyber defences to prevent breaches is a good start, but it’s not enough. Here’s how to take the fight to criminal entrepreneurs and hit them where it hurts. The need for speed in security. Speed is a major issue when it comes to protecting your organisation from cyber […]


How old cyber vulnerabilities threaten your organisation.Open in a New Window

BT and Cisco infographic imageAs we enter a new digital era, organisations need to re-evaluate their cyber security and focus on keeping their data and IT safe. In the early days of digital, cyber security was about protection, rather than recovery. Organisations spent 90 per cent of their security resources on the former, and only the remaining ten per […]


Tip one — boost digital protection with data intelligence, razor precision and technology.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the first of his ten top tips for keeping your data, and organisation, secure. Boosting digital protection should be a high priority for any business that values its data. To do this you need to focus on three […]


Three reasons cyber security enables better business.Open in a New Window

Image from BT and Cisco white paperIt might sound obvious that a digital business needs cyber security. But that’s actually only a small part of the story. Cyber security: not just a fence — a focus. Rather than only doing the bare minimum to protect your organisation, cyber security should be a focus. Why? Because it will help drive your organisation […]


Cheaper, more accessible hacking tools are fuelling the popularity of DDoS attacks.Open in a New Window

Stuart Murphy, DDoS Product Manager, BTBy Stuart Murphy, DDoS Product Manager. The pile ’em high and sell ’em cheap mentality has hit the world of DDoS cyber attacks. They’re now easier and less costly to carry out — are you protected? Any product-development cycle starts with a relatively expensive creation stage requiring a high level of expertise. As any early […]


Ten tips from a renowned cyber security expert.Open in a New Window

ramy houssainiTen tips on keeping your organisation secure from cyber crime — from one of our most renowned experts. Cyber crime — a booming business. Right now, cyber crime costs the global economy $400 billion a year, and that number’s expected to reach $2 trillion by 2019. If you’re not careful, a chunk of that $2 […]


Cyber criminals want the information that can save your life.Open in a New Window

img_0037By Bas de Graaf, Head of Product Management — Security Consulting, BT. The healthcare sector deals with vast amounts of patients’ critical, confidential data every day. So it needs to protect this from cyber criminals. In the world of movie-speak, ‘your money or your life!’ is a well-known quote. ‘Your information or your life’ doesn’t […]


The digital revolution means we need better cyber security.Open in a New Window

Image from BT and Cisco thought leadership paperAs the digital revolution builds pace, businesses and public sector organisations need to keep up. To do this, they need to think about cyber security as an enabler. The fourth industrial revolution. We’re now on the verge of a new, digital era. One where all sectors can benefit from digital technology, and cyber security will […]


Go on the offensive to thwart digital crime.Open in a New Window

Castle image from BT and KPMG digital crime infographicDigital criminals play fast, and they play to win. They’re outpacing current cyber security defences, so it’s time your organisation went on the offensive. No organisation’s security is impenetrable to a skilled and determined criminal entrepreneur. And when dark market forces exploit vulnerabilities before they’re even publically disclosed, or change malware and bot nets as […]


Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]


Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]


An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013


18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]


BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now


Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]


Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]


Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]


Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]


It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar
Paul Slot, KPNNewly Elected ETIS Vice Chairman
Charlotte Hersdorf, TDCNewly Elected ETIS Council Member

Membership Software Powered by®  ::  Legal