Google’s plans for RCS hint at how a deconstructed 5G network could shake up the incumbents which dominate Latin America. The GSMA has been holding the Latin America leg of its Mobile 360 series of conferences this week in Mexico City. The focus was, predictably, on 5G, with the large vendors reiterating their usual messages […]
The post How disruptive will 5G be in Latin America? appeared first on DisruptiveViews.
|This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.
If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.
MUMBAI/BEJING (Reuters) – Chinese telecoms giant Huawei Technologies Co Ltd will start making smartphones in India next month, the company said on Friday, joining a wave of compatriots setting up plants in the world’s third-biggest mobile market. The plant will be operated with the Indian arm of electronics manufacturer Flextronics International Ltd in the southern […]
The post Huawei to start making smartphones in India appeared first on DisruptiveViews.
News highlights for 22 September Liberty’s F1 growth plan includes gaming, gambling (Reuters) – Gaming and gambling are among potential growth areas for Formula One as the sport’s new owners seek to develop largely untapped digital markets, Liberty Media chief executive Greg Maffei said on Thursday. Read more… Grab customers will be able to book […]
The post News highlights – 22 September appeared first on DisruptiveViews.
(Reuters) – Yahoo Inc said on Thursday that at least 500 million of its accounts were hacked in 2014 by what it believed was a state-sponsored actor, a theft that appeared to be the world’s biggest known cyber breach by far. Cyber thieves may have stolen names, email addresses, telephone numbers, dates of birth and […]
The post Analysis: the 500 million Yahoo hack and will it affect Verizon deal? appeared first on DisruptiveViews.
SAN FRANCISCO/WASHINGTON (Reuters) – A U.S. investigation into a leak of hacking tools used by the National Security Agency (NSA) is focusing on a theory that one of its operatives carelessly left them available on a remote computer and Russian hackers found them, four people with direct knowledge of the probe told Reuters. The tools, […]
The post NSA hacking tools found by Russian hackers – careless appeared first on DisruptiveViews.
FRANKFURT (Reuters) – A handful of European tech firms are testing the appetite for initial public offerings, taking their lead from a modest rebound in listings in the United States following a two-year slump. Danish credit card payments processor Nets A/S and Dutch online food ordering firm Takeaway.com plan to list on their home markets […]
The post Are IPOs back in favour with European tech firms? appeared first on DisruptiveViews.
If you ask someone, a customer say, whether they like your product or service, the most likely answer is ‘sure, it’s fine’. If you ask the same customer to score your product or service on a scale of ‘1 to 5’, the likelihood is that they will score you around a ‘3’. This is not […]
The post With big data, please avoid the big bang approach appeared first on DisruptiveViews.
Digital criminals play fast, and they play to win. They’re outpacing current cyber security defences, so it’s time your organisation went on the offensive. No organisation’s security is impenetrable to a skilled and determined criminal entrepreneur. And when dark market forces exploit vulnerabilities before they’re even publically disclosed, or change malware and bot nets as […]
By Neil Mellor, Business Development Director, BT. The NHS’ move to paperless working can expose patient records to significant risk. Mitigating these, and retaining public confidence, requires effective security. Cyber Security in Healthcare event. With the Cyber Security in Healthcare conference happening very soon, it’s a good time to look at this important area of […]
The year data was held to ransom. In 2016 more organisations and individuals have fallen victim to ransomware and DDS extortion demands than ever before. The second blog in our web security series focuses on ransomware; a type of malware that encrypts files and data, demanding payment before they can be accessed. Initially, it was […]
By Mark Hughes, CEO, BT Security. Cyber criminals have a business plan, just like you do. Here’s how to identify and fight back against this new breed of entrepreneur. Who the cyber criminals are. The twenty-first century cyber criminal is best characterised as a ruthlessly efficient entrepreneur or CEO, operating in a highly developed and […]
By Peter Negus, Solutions Architect, BT. WAN encryption is ineffective on private MPLS networks and makes you more vulnerable to a DDoS attack. Here’s what you really need. Your security situation. Let me start by saying that encryption does have its place in the grand scheme of things. Unfortunately, the problem is that many people […]
By Steve Frost, BT Security Partnership Manager, Cisco. With Gartner’s Security Summit around the corner, Steve Frost takes us through some of the major findings from Cisco’s 2016 mid-year security report. Get up-to-date with cyber security. With the Gartner Security & Risk Management Summit on the way (taking place in London, 12-13 September), I thought […]
When it comes to protecting your organisation from digital crime, are you looking for vulnerabilities in the right place? Criminal entrepreneurs could be recruiting your people to fraudulently manipulate your systems, steal your data, or extort money from your organisation using DDoS attacks or ransomware. An astounding 96 per cent of businesses admit digital criminals […]
There’s never been a better time to work in cyber security. So find out what it’s like to be at the heart of operations in BT’s specialist security arm. Join the fight. Cyber crime is a growing threat to organisations around the world. It’s an issue that we haven’t taken lightly here at BT, and […]
Gone are the days when ‘all’ the CISO did was keep threats out. Now, it’s about strategy as much as defence. Today’s CISO is the first-line of defence against a multitude of threat vectors like ransomware, phishing, hacking, fake websites and distributed denial of service (DDoS) attacks. They are also increasingly involved in strategy, as […]
The CISO’s job description has changed beyond all recognition, reflecting seismic shifts in the digital environment. So what does today’s CISO need to focus on? The changing role of the CISO. In recent years, the CISO’s role has changed dramatically. Once purely defensive, responsible for patrolling a specific perimeter, the CISO now has to look […]
Discover the latest threat to your cyber security — and how to deal with it. A bad way to start the day. Imagine turning on your computer to find that, instead of your usual desktop, you’ve got a note. The note says something along the lines of: “All of your files have been encrypted. You […]
By Mark Hughes, CEO, BT Security. You can’t protect yourself from a threat you can’t see. Here’s how to get a clear view of the risks your organisation faces. A significant threat. Everyone knows that cyber security is a growing problem. The UK National Crime Agency recently highlighted cyber crime as one of the most […]
By Martin Stemplinger, Strategic Security Deals Lead, BT. IT architecture paradigms and approaches change regularly, and security must adapt — rethinking the associated risk as well as processes and policies. The changing state of IT. IT is in a constant state of flux — evolving on a daily basis. And one of the biggest jumps […]
By Mark Hughes, CEO, BT Security. We all know that cyber security is a serious issue, but do you truly know the full scale of the threats you face? Build the battlements of the future. If you want to learn how to deal with the ever-changing nature of cyber attacks on your organisation, you could […]
Want to work in an exciting, growing and rewarding sector? Look no further. The dream job you didn’t think about as a child. Let’s be honest, when people think about their dream job, a role in cyber security probably isn’t the first thing that comes to mind. Astronaut, spy, firefighter, doctor — those are the […]
I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]
During the early 90′s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]
A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013
As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]
An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now
Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]
A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]
Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]
Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]
I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]