My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |

 

This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


 

Cyber security has become a C level priorityOpen in a New Window

Security executives are under increasing pressure to keep sensitive networks, systems and data safe from threats which are rapidly increasing in both frequency as well as complexity. It’s no surprise, then, that CSOs and CISOs often find themselves in the hot seat when it comes to the topic of cyber security. Their roles are changing along […]

 

News highlights – 22 MayOpen in a New Window

News highlights for 22 May Nokia settles patent dispute with Apple, signs collaboration deal HELSINKI (Reuters) – Nokia has settled its patent dispute with Apple and signed a business collaboration deal with the U.S. giant, the Finnish firm said on Tuesday, sending its shares sharply higher. Read more… Hong Kong police arrest 21 Uber drivers […]

 

The unpicking of the net neutrality rules begins in the USOpen in a New Window

The US Federal Communications Commission has voted to overturn the previous Obama-era FCC Net Neutrality rules. The Federal Communications Commission has officially begun to undo Obama-era regulations on Internet service providers. The FCC Net Neutrality rules, passed in 2015, had placed cable and telecom companies under the strictest-ever oversight of the agency. In a 2-1 […]

 

Huawei narrows gap on main smartphone rivals, Apple, SamsungOpen in a New Window

FRANKFURT (Reuters) – China’s Huawei has narrowed the gap with its two biggest competitors Apple Inc. and Samsung Electronics in global smartphone sales, first-quarter data from research firm Gartner showed on Tuesday. The Chinese network-to-consumer-electronics builder increased its market share to 9 percent during the first quarter from 8.3 percent in the year-earlier period. “Huawei […]

 

Toyota, MIT and tech firms explore blockchain for driverless carsOpen in a New Window

NEW YORK (Reuters) – Toyota Research Institute, a wholly owned unit of Toyota Motor North America, said on Monday it has teamed up with MIT Media lab and five other companies to explore blockchain technology for the development of driverless cars. The project would enable businesses and consumers to securely share data on testing and […]

 

Here’s how innovation is alive, well and thriving (in some telcos)Open in a New Window

It seems that innovation is alive and well at Deutsche Telekom. For a start no-one in the company has their own desk, according to Erik Meijer, head of Group Innovation, “not even the CEO. In fact, my secretary’s first task in the morning is to figure out where I am”. This – sadly rather sparsely […]

 

Welcome to Unit 180, where North Korea launches cyber attacks – allegedlyOpen in a New Window

SEOUL (Reuters) – North Korea’s main spy agency has a special cell called Unit 180 that is likely to have launched some of its most daring and successful cyber attacks, according to defectors, officials and internet security experts. North Korea has been blamed in recent years for a series of online attacks, mostly on financial […]

 

Our security blog is about to be transformed…Open in a New Window

Someone using a tabletChange is on the horizon. Our security blog is getting a fresh look and new functionality. Here’s what you need to know. This blog has always been a place where you can get the latest news, as well as views and insights from those working in the industry. And that’s not going to change. What […]

 

Hackers Matter: Issue two — the disclosure game.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. You can patch known bugs in your system, but what about the ones you don’t know about? Here’s why ‘the disclosure game’ is vital to your cyber security. An eventful trip to Troopers. I’m just back from Troopers, the best hacker conference in the world. This year, it celebrated […]

 

Securing applications with blockchain: Issue one — an introduction to blockchain.Open in a New Window

chip and PIN paymentBlockchain is the big new idea in tech, but is it worth the hype? Discover how it actually works (and why it matters to the security of your applications).   Dr Jonathan Tate, Solution Architecture Lead, Security CTO Team       Dr Joshua J Daniel, Senior Researcher, Security Futures Practice.     Introducing blockchain. […]

 

Mind the security gap with effective endpoint protection.Open in a New Window

Rob Daniels, General Manager of Security Portfolio Strategy, BT.By Rob Daniels, General Manager of Security Portfolio Strategy, BT. It used to be simple for organisations to protect devices at work. But here’s how mobile working has made endpoint security more critical than ever. Securing a more mobile world. You’re probably reading this on a mobile device or a laptop. That’s the way we […]

 

Discover how DMARC keeps spoofed email addresses out of your inbox.Open in a New Window

Peter Negus, Solutions Architect, BT.By Peter Negus, Solutions Architect, BT. Discover how Domain-based Message Authentication, Reporting and Conformance (DMARC) improves security and keeps spoofed email addresses out of your inbox.   Spoofing emails and cyber security.   It’s 6pm on Friday and you need to go home. An email from what appears to be security@bt.com arrives in your inbox. […]

 

Getting your security ready for GDPR.Open in a New Window

Jose Francisco Pereiro Seco, Head of Data Security Europe, BT.By Jose Francisco Pereiro Seco, Head of Data Security Europe, BT. Digital transformation unlocks huge potential — and raises significant data protection and privacy risks. Here’s what the GDPR means for your security. Regulatory change for a digital world: GDPR. On 14 April 2016, the European Parliament adopted a new regulation that will replace the […]

 

Make sure you’re prepared for GDPR.Open in a New Window

Guus van Es, General Manager, Security Consulting, BT.By Guus van Es, General Manager, Security Consulting, BT. BT’s security consultants have long advised customers to design security and data protection into their core processes. Innovation and security are two sides of the same coin. This combined ‘outside-in’ and ‘inside-out’ approach to security makes sense in a threat environment that is changing so rapidly. […]

 

Keep your cyber security afloat in a sea of threats.Open in a New Window

Deborah Moir, Security Consultant, BT.By Deborah Moir, Security Consultant, BT. Securing your network against cyber crime is a bit like trying to keep water out of a leaky boat. Here’s the process you need, if you want to stay afloat. A dangerous situation. Imagine you’re at sea and the weather’s bad. You and a small crew are piloting a […]

 

Power ahead: manage risks and embrace digital disruption.Open in a New Window

An aeroplaneBy Ramy Houssaini, Vice President of Security Europe, BT. Our digital world is thriving. Rapid innovation is radically changing the technology and cyber-risk landscape. New business models relying on cloud and mobile environments are continuously dissolving the traditional perimeter, scattering data everywhere and creating new exposures. Digital trust is rapidly emerging as the new competitive frontier […]

 

Hackers matter: Issue one — hackers wanted.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. ‘Hacker’ is an emotive term today. But, go back to its roots, and there’s a clear case for teaching, mentoring and developing hacker skills. We all need hackers. I’m going to start with a provocative statement: hackers are a national resource and should be encouraged, cultivated and embraced. There, […]

 

How to achieve the ‘Fort Knox’ of cyber security.Open in a New Window

Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT.By Chris Wilson, Head of Marketing and Portfolio, North East Asia, BT. The City of London took its expertise in fighting digital crime to Asia, exploring how the right cyber defences can offer a digital version of Fort Knox. Protecting the cyber equivalent of Fort Knox. As a world-leading hub of digital enterprise, the City […]

 

Security-enabled business: Software-defined networks.Open in a New Window

Sam Cater, Future Cyber Capabilities Specialist, BT.By Sam Cater, Future Cyber Capabilities Specialist, BT. The development of SDN in recent years has made it an incredibly useful technology, but it comes with an unfortunate side-effect… How SDN works. A software-defined network (SDN) is essentially a TCP/IP stack which is driven by a software application as opposed to the operating system’s kernel. […]

 

Can a data breach be a good thing?Open in a New Window

By Rob Partridge, Head of the BT Cyber Security Academy. Big security breaches gain headlines, but organisations often fail to learn from them. Here’s how our apprentices help us avoid a car crash for cyber security. Failing to learn the right lessons. Rubbernecking; we’ve all been there. Driving along the motorway, and suddenly the traffic […]

 

Security-enabled business: Cloud Access Security Brokers.Open in a New Window

datacentreMore organisations are aware of productivity-boosting cloud applications, but few know how to use these securely. That’s where Cloud Access Security Brokers can help. Clouds. Visibility, nil. As organisations seek to benefit from the flexibility, convenience and cost-efficiency of the cloud, security is expanding out of the data centre. This leaves security decision-makers without visibility […]

 

Humans Matter: Issue four – Are you a maestro?Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K. Fite, Account CISO, BT. Recent technology conferences have shown that orchestration of robotic workforces has some way to go to replace the human touch. Bryan K. Fite explores why. No one has ‘the answer’. As I write this blog, I’m sitting in a small sushi joint at the top of a hill […]

 

Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]

 

Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]

 

An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013

 

18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]

 

BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now

 

Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]

 

Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]

 

Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]

 

Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]

 

It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar

01/06/2017 » 02/06/2017
Data Privacy Task Force Meeting June 2017

Spotlight
Jan Sonck, ProximusNewly Elected INNWG Chair
Zsolt Butyka, Magyar TelekomNewly Elected INNWG Vice Chair

Surveys
 
Membership Software Powered by YourMembership  ::  Legal