My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |


This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


How disruptive will 5G be in Latin America?Open in a New Window

Google’s plans for RCS hint at how a deconstructed 5G network could shake up the incumbents which dominate Latin America. The GSMA has been holding the Latin America leg of its Mobile 360 series of conferences this week in Mexico City. The focus was, predictably, on 5G, with the large vendors reiterating their usual messages […] The post How disruptive will 5G be in Latin America? appeared first on DisruptiveViews.


Huawei to start making smartphones in IndiaOpen in a New Window

MUMBAI/BEJING (Reuters) – Chinese telecoms giant Huawei Technologies Co Ltd will start making smartphones in India next month, the company said on Friday, joining a wave of compatriots setting up plants in the world’s third-biggest mobile market. The plant will be operated with the Indian arm of electronics manufacturer Flextronics International Ltd in the southern […] The post Huawei to start making smartphones in India appeared first on DisruptiveViews.


News highlights – 22 SeptemberOpen in a New Window

News highlights for 22 September Liberty’s F1 growth plan includes gaming, gambling (Reuters) – Gaming and gambling are among potential growth areas for Formula One as the sport’s new owners seek to develop largely untapped digital markets, Liberty Media chief executive Greg Maffei said on Thursday. Read more… Grab customers will be able to book […] The post News highlights – 22 September appeared first on DisruptiveViews.


Analysis: the 500 million Yahoo hack and will it affect Verizon deal?Open in a New Window

(Reuters) – Yahoo Inc said on Thursday that at least 500 million of its accounts were hacked in 2014 by what it believed was a state-sponsored actor, a theft that appeared to be the world’s biggest known cyber breach by far. Cyber thieves may have stolen names, email addresses, telephone numbers, dates of birth and […] The post Analysis: the 500 million Yahoo hack and will it affect Verizon deal? appeared first on DisruptiveViews.


NSA hacking tools found by Russian hackers – carelessOpen in a New Window

SAN FRANCISCO/WASHINGTON (Reuters) – A U.S. investigation into a leak of hacking tools used by the National Security Agency (NSA) is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. The tools, […] The post NSA hacking tools found by Russian hackers – careless appeared first on DisruptiveViews.


Are IPOs back in favour with European tech firms?Open in a New Window

FRANKFURT (Reuters) – A handful of European tech firms are testing the appetite for initial public offerings, taking their lead from a modest rebound in listings in the United States following a two-year slump. Danish credit card payments processor Nets A/S and Dutch online food ordering firm plan to list on their home markets […] The post Are IPOs back in favour with European tech firms? appeared first on DisruptiveViews.


With big data, please avoid the big bang approachOpen in a New Window

If you ask someone, a customer say, whether they like your product or service, the most likely answer is ‘sure, it’s fine’. If you ask the same customer to score your product or service on a scale of ‘1 to 5’, the likelihood is that they will score you around a ‘3’. This is not […] The post With big data, please avoid the big bang approach appeared first on DisruptiveViews.


Go on the offensive to thwart digital crime.Open in a New Window

Castle image from BT and KPMG digital crime infographicDigital criminals play fast, and they play to win. They’re outpacing current cyber security defences, so it’s time your organisation went on the offensive. No organisation’s security is impenetrable to a skilled and determined criminal entrepreneur. And when dark market forces exploit vulnerabilities before they’re even publically disclosed, or change malware and bot nets as […]


How cyber security can enable a better NHS.Open in a New Window

Neil Mellor, Business Development Director, Security, BT.By Neil Mellor, Business Development Director, BT. The NHS’ move to paperless working can expose patient records to significant risk. Mitigating these, and retaining public confidence, requires effective security.  Cyber Security in Healthcare event. With the Cyber Security in Healthcare conference happening very soon, it’s a good time to look at this important area of […]


Could you afford to lose all of your data?Open in a New Window

cyber-securityThe year data was held to ransom. In 2016 more organisations and individuals have fallen victim to ransomware and DDS extortion demands than ever before. The second blog in our web security series focuses on ransomware; a type of malware that encrypts files and data, demanding payment before they can be accessed. Initially, it was […]


The three levels of cyber crime.Open in a New Window

mark-hughesBy Mark Hughes, CEO, BT Security. Cyber criminals have a business plan, just like you do. Here’s how to identify and fight back against this new breed of entrepreneur. Who the cyber criminals are. The twenty-first century cyber criminal is best characterised as a ruthlessly efficient entrepreneur or CEO, operating in a highly developed and […]


Why WAN encryption won’t keep you secure.Open in a New Window

security-cloudBy Peter Negus, Solutions Architect, BT. WAN encryption is ineffective on private MPLS networks and makes you more vulnerable to a DDoS attack. Here’s what you really need. Your security situation. Let me start by saying that encryption does have its place in the grand scheme of things. Unfortunately, the problem is that many people […]


Key findings from Cisco’s 2016 mid-year security report.Open in a New Window

Steve Frost, CiscoBy Steve Frost, BT Security Partnership Manager, Cisco. With Gartner’s Security Summit around the corner, Steve Frost takes us through some of the major findings from Cisco’s 2016 mid-year security report. Get up-to-date with cyber security. With the Gartner Security & Risk Management Summit on the way (taking place in London, 12-13 September), I thought […]


The internal digital security threat.Open in a New Window

kpmg-digital-crime-business-infographicWhen it comes to protecting your organisation from digital crime, are you looking for vulnerabilities in the right place? Criminal entrepreneurs could be recruiting your people to fraudulently manipulate your systems, steal your data, or extort money from your organisation using DDoS attacks or ransomware. An astounding 96 per cent of businesses admit digital criminals […]


Why you should join us in the fight against cyber crime.Open in a New Window

identity-managementThere’s never been a better time to work in cyber security. So find out what it’s like to be at the heart of operations in BT’s specialist security arm. Join the fight. Cyber crime is a growing threat to organisations around the world. It’s an issue that we haven’t taken lightly here at BT, and […]


Why today’s CISO needs to be a strategic visionary.Open in a New Window

16008_Infosec_infographic_FIGone are the days when ‘all’ the CISO did was keep threats out. Now, it’s about strategy as much as defence. Today’s CISO is the first-line of defence against a multitude of threat vectors like ransomware, phishing, hacking, fake websites and distributed denial of service (DDoS) attacks. They are also increasingly involved in strategy, as […]


Why strategy, not defence, is the future of cyber security.Open in a New Window

businessman in the officeThe CISO’s job description has changed beyond all recognition, reflecting seismic shifts in the digital environment. So what does today’s CISO need to focus on? The changing role of the CISO. In recent years, the CISO’s role has changed dramatically. Once purely defensive, responsible for patrolling a specific perimeter, the CISO now has to look […]


How to avoid being held for ransom.Open in a New Window

rethink the riskDiscover the latest threat to your cyber security — and how to deal with it. A bad way to start the day. Imagine turning on your computer to find that, instead of your usual desktop, you’ve got a note. The note says something along the lines of: “All of your files have been encrypted. You […]


To avoid cyber threats, you have to know what they are.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO, BT Security. You can’t protect yourself from a threat you can’t see. Here’s how to get a clear view of the risks your organisation faces. A significant threat. Everyone knows that cyber security is a growing problem. The UK National Crime Agency recently highlighted cyber crime as one of the most […]


How cyber security can adapt to the cloud.Open in a New Window

Cloud security with OvumBy Martin Stemplinger, Strategic Security Deals Lead, BT. IT architecture paradigms and approaches change regularly, and security must adapt — rethinking the associated risk as well as processes and policies. The changing state of IT. IT is in a constant state of flux — evolving on a daily basis. And one of the biggest jumps […]


Why you need to rethink the risk of cyber threats.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO, BT Security. We all know that cyber security is a serious issue, but do you truly know the full scale of the threats you face? Build the battlements of the future. If you want to learn how to deal with the ever-changing nature of cyber attacks on your organisation, you could […]


Your new career awaits — more security roles now available.Open in a New Window

BT Assure Analytics - watch the videoWant to work in an exciting, growing and rewarding sector? Look no further. The dream job you didn’t think about as a child. Let’s be honest, when people think about their dream job, a role in cyber security probably isn’t the first thing that comes to mind. Astronaut, spy, firefighter, doctor — those are the […]


Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]


Sequent Values and PrinciplesOpen in a New Window

During the early 90′s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]


An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013


18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]


BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now


Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]


Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]


Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]


Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]


It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar

13/10/2016 » 14/10/2016
ETIS Community Gathering 2016

Veronika Jermanova, ETISThe new ETIS Comms Coordinator

Membership Software Powered by®  ::  Legal