My Working Groups   |   Print Page   |   Contact Us   |   Sign In
ETIS Search
ETIS member blogs
Share |


This feed contains a dynamic collection of blogs from the ETIS Members, Associate Members and Partners taking part in the ETIS Working Groups. The Blogs cover a wide range of ETIS related topics such as Information Security, Anti-Spam, Billing, Business Intelligence and more Telco OSS/BSS issues. Once logged in, all ETIS members have also the possibility to publish a Blog both on their own personal profile pages and in the Working Group pages.

If you would like to learn more about how to add a Blog to the ETIS website or access the Members Corner please contact us for more information.


Brace! Brace! The size and scale of DDoS attacks is about to get much worseOpen in a New Window

2017 is going to be a pivotal year with the rise in DDoS, with an average of one attack a month reaching at least 1 Tbps in size. In addition, the number of DDoS attacks for the year are expected to reach 10 million, according to the latest technology, media and telecommunications predictions report [PDF] from Deloitte. The […]


About turn, business leaders turn from globalisation to localisation at DavosOpen in a New Window

DAVOS, Switzerland, Jan 19 (Reuters) – Business leaders in Davos, traditionally the high priests of globalisation, are talking up the benefits of local production this week to shield themselves from criticism from incoming U.S. President Donald Trump. Elected on a jobs-focused “America First” platform, Trump has taken to Twitter to rebuke major companies like General […]


News highlights – 18 JanuaryOpen in a New Window

News highlights for 18 January No trade war between US and China says Alibaba boss in Davos DAVOS, Switzerland (Reuters) – China and the United States are not about to be drawn into a trade war, Alibaba Executive Chairman Jack Ma said on Wednesday at the World Economic Forum (WEF) in Davos. Read more… Most […]


Toshiba may book $6 billion write down on its US nuclear businessOpen in a New Window

TOKYO (Reuters) – Toshiba Corp’s financial crisis deepened on Thursday as media reported it may book a bigger-than-expected $6 billion writedown on its U.S. nuclear business, sending its shares sliding 15 percent. The reports cast doubt on whether measures the beleaguered industrial conglomerate is expected to take to bolster its finances – including the sale […]


Oracle in the dock over discrimination charges relating to hiring policyOpen in a New Window

(Reuters) – The U.S. Labor Department has sued Oracle America Inc, alleging that the technology company systematically paid its white, male employees more than other workers and unlawfully favored Asian applicants in its recruiting and hiring efforts. The department in a complaint filed with an administrative judge in Washington said the company was prohibited from […]


EE is the latest telco to be fined millions for billing errors, but it won’t be the lastOpen in a New Window

Billing is still causing major problems for operators and their customers. The latest to fail is UK company EE, which has been handed out a £2.7 million fine by regulator Ofcom. The fine is over ten times the amount that EE overcharged their customers. Many billing professionals will look at this story and raise their […]


Everything you need to know about 5G in 417 words (think OTT)Open in a New Window

5G has plenty of market potential, but cellcos have to get their heads around the complexity of evolution and the fact that they really have to embrace software over hardware for 5G to pay off. That was the message from I Chih-Lin, chief scientist of wireless technologies at China Mobile Research Institute (CMRI), who kicked […]


The main security threats for the oil and gas industry.Open in a New Window

Image from BT Oil and Gas white paperAdvances in technology mean positive transformation for the oil and gas industry, but the benefits will only be felt if these threats are addressed… In our previous blog on this topic, we talked about how technology such as IP-enabled equipment, the Internet of Things (IoT) and big data are helping to transform the oil and […]


Risk and reward: automation and Big Data in oil and gas.Open in a New Window

Image from BT Oil and Gas white paperBig Data and automation can create significant improvements within the oil and gas industry, but they come with cyber security risks that can’t be ignored. The rewards of integrating new technology. Already, IP-enabled equipment has changed the oil and gas industry, automating time-consuming processes and providing a clear overview of operations. As our white paper […]


Could you be part of BT’s next generation of cyber defenders?Open in a New Window

BT apprenticeships page imageAs cyber attacks increase in scale and sophistication, we’re looking to the future of cyber security — with apprenticeships for the next generation of experts. A growing demand for new skills. According to The Economist, 2016 was “a cracking year for hacking” and it claims “things are likely to get worse before they get better”. In […]


There’s a new cyber security sheriff in town…Open in a New Window

BT and KPMG infographic fiveThe changing nature of cyber threats might make security a challenge, but here’s one way your organisation can turn risk into opportunity. Sometimes, it seems that all the talk of cyber security and digital crime is about doom and gloom. It’s true, you face serious risks from criminal entrepreneurs — and you do need to […]


My top five cyber security articles for business 2016.Open in a New Window

Luke BeesonBy Luke Beeson, VP Security UK and Global Banking & Financial Markets, BT. With the impact of cyber attacks having continued to increase through 2016, here’s a round-up of the best articles about cyber security this year. A turning point in the fight against cyber crime. If 2015 was the year that made many global […]


Taking stock of my top ten cyber security tips.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. As the threat landscape becomes increasingly complex, here’s why organisations need to be more vigilant than ever about cyber security. Today’s cyber criminals are constantly developing their attack tactics. And that makes it imperative that organisations have plenty of evolving strategies in place to keep data […]


Tip ten — reduce complexity wherever you can.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the tenth and final of his top tips for keeping your data, and organisation, secure. Complexity is the enemy of security. Complex infrastructure, especially non-standard infrastructure, with multiple applications, can make managing everything a nightmare. And the more […]


Humans matter: Issue two — Diversity is good for the species.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan K Fite, Account CISO, BT. 2016 was the year of the hack — but we’re approaching a tipping point. It’s time to stop looking for the elusive silver bullet and start taking responsibility for our cyber security. 2016 — the year of the hack. As I prepare for the holidays and take stock […]


Mr. Pink doesn’t tip.Open in a New Window

Bryan K. Fite, BT US&C Security Portfolio ManagerBy Bryan Fite, Account CISO, BT. Facing extortion at the hands of cyber criminals, what would you do? Bryan Fite reveals how he helped an organisation going through just that.  The start of a cyber saga. Some months ago, I was traveling home from a long, productive week of client and team meetings. As I […]


Four cyber security challenges for cloud deployment.Open in a New Window

Man using tabletIn our last blog, we explained the questions you need to ask before introducing the cloud. Here, we’ll share the challenges of deployment, and how to overcome them. Challenge one: the evolving threat landscape. An evolving cyber-threat landscape is something many organisations are aware of. But, over the past few years, new threats have become […]


Six tips for choosing the right penetration-testing partner.Open in a New Window

Bas de Graaf, Head of Product Management — Security Consulting, BT.By Bas de Graaf, Head of Product Management — Security Consulting, BT. Penetration testing is integral to security. But choosing the wrong partner could have significant implications, as Bas de Graaf, of BT’s Ethical Hacking capability, explains. Buy cheap, buy twice (and then some). Penetration testing is an area of cyber-security investment where you really […]


Tip nine — identify critical digital processes and high-risk integration points.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the ninth of his ten top tips for keeping your data, and organisation, secure. The only way to protect what matters to your organisation, is to first figure out exactly what is important to your organisation. You need […]


The war against cyber crime finds a historic home for new recruits — Bletchley Park.Open in a New Window

Mark Hughes, CEO, BT SecurityBy Mark Hughes, CEO Security, BT. Bletchley Park, famous home of WWII codebreaking, is about to find a new lease of life — with a key role in the fight against cyber crime. Cyber crime is a growing threat. You don’t have to look far to find recent examples of the threat posed by cyber […]


The cloud: cyber risk and business rewards.Open in a New Window

datacentreOrganisations taking advantage of the cloud risk their data. So it’s critical they deploy prevention-focused security architecture, as our whitepaper explains. The benefits of moving to the cloud. If it puts the security of your data at such risk from cyber criminals, why would organisations choose to move to the cloud? Well, the benefits of […]


Tip eight — concentrate your security supply chain.Open in a New Window

Ramy Houssaini, BT SecurityBy Ramy Houssaini, Vice President of Security Europe, BT. Ramy Houssaini knows cyber security inside out. Here’s the eighth of his ten top tips for keeping your data, and organisation, secure. The market for security is huge, with hundreds of vendors out there. This means that the sector is fragmented, but full of opportunity. Generally […]


Images from ROpen in a New Window

I hate having my photo taken, always have – but it is one of the things you have to do when you are in business. I use a standard portrait and it can be found on LinkedIn, Facebook, About.Me, etc. However Niek Temme, who I work with at a client site has used R to […]


Sequent Values and PrinciplesOpen in a New Window

During the early 90’s I had the honour and pleasure to work with a great group of people at Sequent Computer Systems. The company had a set of great set of values and principles and I often refer to them and sometimes am asked for a copy. In the absence of being able to find […]


An Introduction to Data Virtualization in Business IntelligenceOpen in a New Window

A new presentation entitled An Introduction to Data Virtualization in Business Intelligence is now available. It provides a brief description of what Data Virtualization is and how it can be used to support business intelligence applications and development. Originally presented to the ETIS Conference in Riga, Latvia in October 2013


18 years and counting …Open in a New Window

As a company we are rapidly approaching our 18th year of delivering ‘Data Management & Warehousing’ solutions to our clients. We started trading on 1 July 1995 and by 25 September 1995 we had our domain name – we used Demon Internet to get the domain name and because we were in the UK and […]


BI SaaS & Cloud Strategies for TelcosOpen in a New Window

An ETIS presentation from Brussels in March 2013 This presentation looks at what SaaS and Cloud mean for BI and analytics in Telcos. Read more in the presentation … Download BI SaaS & Cloud Strategies for Telcos now


Education OnlineOpen in a New Window

Those of you that know our consultants, or have read some of the blog posts on this website will be aware of our interest in on-going education and understanding, not only in our field of work but in the wider world. Here we list some of the online resources that are changing the way on-going […]


Addressing Business Intelligence Data QualityOpen in a New Window

A friend of mine posted a link to Michael W. Dobson’s TeleMapics Blog entitled Google Maps announces a 400 year advantage over Apple Maps about Apple’s problems with the release of their own mapping solution with iOS6. These problems are well documented elsewhere but Michael’s post highlights problems not just associated with mapping data but common across […]


Building An Analytical PlatformOpen in a New Window

Reprint of an article published by SAP about a recent piece of work I have recently been asked to build an analytical platform for a project – but what is an analytical platform? The client (a retailer) described it as a database where they could store data, a front end where they could do statistical work […]


Inspirational Data VisualizationOpen in a New Window

Data visualization has come of age – there is now no excuse for not only having good information but also for presenting it in an engaging and informative way. Here we look at a number of sites that can inspire and inform the way you present your information. Nathan Yau has a blog called Flowing Data that gathers […]


It’s time for Slow Business IntelligenceOpen in a New Window

I have been aware for a few months of the Slow Web Movement, which, like other parts of the slow movement, advocates a cultural shift toward slowing down life’s pace. More specifically it is about getting more value and less volume from the web, getting quality information when it is appropriate and not being overwhelmed […]
more Calendar

19/01/2017 » 20/01/2017
Data Privacy Task Force Meeting

16/03/2017 » 17/03/2017
Innovation Working Group Meeting Spring

Paul Slot, KPNNewly Elected ETIS Vice Chairman
Charlotte Hersdorf, TDCNewly Elected ETIS Council Member

Membership Software Powered by YourMembership  ::  Legal