Next Generation Communications Blog

AirHopper: Even Air-Gap Networks are Not Secure

It’s a good time to be in the Cybersecurity business. Quite often, highly secure computers are disconnected from the outside world so...

Full Story »

The era of the hardware-based media server is over -scaling software-based media servers

As the telecom world moves closer and closer to software- based infrastructure, many questions are being asked about scalability of these...

Full Story »

Brochures

Full Story »

10 Reasons Why Microsoft is Winning

With new CEO Satya Nadella at the helm, Microsoft is changing and into something it needs to be. A company embracing a...

Full Story »

Recognizing the Similarities Between WebRTC and VoIP

Next week I’ll be giving a keynote at the WebRTC Conference and Expo V.  When I last gave a keynote at...

Full Story »

Invisible is Good Design

The whole idea of being a technology provider is that you make the technology invisible to the customer. They just have...

Full Story »

VDSL and Vectoring are Important Parts of Broadband Deployment

By: Wendy Zajack, Dir. Product Communications, Alcatel-Lucent

From original on Alcatel-Lucent corporate blog

A few months ago our home WiFi slowed to a crawl. At first we thought it was a temporary thing, but after my son ran a diagnostic there was a problem with our high-speed broadband.  

While the technician was fixing it, he mentioned that for an extra $10 a month we could get a faster plan.  Living in the US we already (in my opinion) pay enough for our monthly broadband package so I immediately said ‘no.’ But I told my kids that IF they wanted to pay for it … we would consider it.

Full Story »

Using communications to reduce climate change impact

At its Bell Labs facilities, and through its work with the CTVR, Alcatel-Lucent is looking to drive R&D efforts that will bring such energy efficient technologies to the next generation communications environment, helping reduce the carbon emissions from telecom equipment, which now stands at about two percent of the global carbon emissions, but is set to grow significantly in the coming years without such efforts from Alcatel-Lucent and the CTVR.

How can the Telecom sector use applications and services to enable other industries and consumers reduce their impact on the environment?

It's clear that businesses are looking to become more environmentally responsible - though largely because of the cost savings that are inherent to "going green." Regardless, the telecom sector, thanks to the proliferation of IP networking solutions and eco-friendly technologies, are in a position to play a major role in driving greenhouse gas reduction and energy conservation in the global business environment.

Technical, product leadership and the ability to test solutions prior to deployment: Why these attributes are key for LTE deployments

Yes, it's still all about the applications and content, but in order to effectively introduce the next generation of bandwidth-intensive services, operators have to take the time and effort to ensure success. Alcatel-Lucent not only provides the technology expertise to support an intelligent migration strategy, but is providing a forum for ongoing collaboration that will benefit the entire community - from network operators to end users.

How can I enable a single, unified sign on for my customers across multiple screens?

By leveraging technology like Alcatel-Lucent's TPSDA, operators will be able to eliminate the traditional gaps between different devices and different access technologies, unifying all services for their subscribers on a single architecture.

Key Factors Driving the Need for a Comprehensive Security Blueprint

A recent U.S. Government Accountability Office report warned that cyber-threats facing federal networks and the country's critical infrastructure are becoming increasingly sophisticated. And while the number of attacks is exponentially growing - security incidents grew by over 200 percent from fiscal year 2006 to fiscal year 2008 - the report concludes that the country is not optimally prepared to protect itself from such attacks.

Although this particular report is in reference to government networks, enterprise security is as vulnerable, if not more so. Rapid advances in communications technology have been accompanied by an equally rapid increase in security threats, the growth of cybercrime and the introduction of new security regulations.

Leveraging Strategic Collaboration to Enhance Network Operations and Service Offerings

Given the state of the market, operators need a new strategy to differentiate and compete successfully. Reducing capital and operating expenses and generating new revenue while defining the business models that can help in meeting critical business goals is one place to begin such an endeavor.   In fact, according to an Alcatel Lucent whitepaper, studies show that outsourcing and infrastructure sharing can help operators increase their free operating cash flow by as much as 10 percent.   The latest trend is for fixed, fixed-mobile and mobile operators to work together to deliver broadband services. For example, cable television providers are offering multimedia content, high-speed Internet access and voice services.

A look at the future: Re-defining the communications partner ecosystem

The services and capabilities that have, until now, served carriers well, are only a part of what subscribers are demanding - they want more services and applications, more access, and more integration with their various access devices and networks.

Best practices for managing events, policy and traffic on your network

Through its two components - the Alcatel-Lucent 9900 Detector (deployed in the packet core) and the Alcatel-Lucent 9900 Central (deployed in the NOC) - the 9900 WNG delivers a significant advantage to wireless operators looking for an edge over their competition, providing advantages in a number of areas, including operations, planning, security, engineering, marketing, and revenue assurance.

Top Benefits of Web 2.0 and Cloud Computing in a Business Environment

Rapid advancements in communications technology have been accompanied by an equally swift multiplication in security threats, a growth in cybercrime as well as the introduction of new security regulations.

 

Despite security concerns, according to a recent study, a majority of executives polled by Deloitte - 60.9 percent - believe cloud computing will be a transformative technology in the industry and can drive financial benefits, or at least be useful for certain kinds of enterprise services.

 

Web 2.0, which allows information to be sourced from many locations and displayed as composite parts of new applications, is changing the way enterprises use the Internet for business interactions with employees, customers, partners and suppliers, according to a recent Alcatel Lucent whitepaper.

 

Company officials contend that cloud computing "is on the horizon with the promise to reduce costs by creating virtual computing 'clouds' in cyberspace."

 

New business models enabled by Web 2.0 and cloud computing are indeed creating more challenges by externalizing business processes and moving them to cyberspace where there is less control of private data and the traditional enterprise perimeter can no longer provide a sufficient defense.

 

The new business models are being rapidly adopted without mastering how to make the technology less vulnerable, according to Alcatel Lucent officials. As companies embrace mobile communications, enable employees to work from remote locations, and co-market and sell with partners, the enterprise IT team needs to respond with new security methods to keep the enterprise secure.

 

As such, an advanced and secured communications network is the key to enabling an enterprise to respond to this new business environment and become a dynamic enterprise.

 

According to the Deloitte survey, cloud computing enthusiasm was somewhat tempered by executives' concern over security and privacy, as 34.6 percent cited these issues as the largest considerations for adopting cloud computing in their organizations.

 

However, by following a user-centric security blueprint, enterprises will be positioned to leverage new business models made possible by Web 2.0, cloud computing and mobile communications technology.

 

According to Alcatel Lucent, this blueprint describes the elements required to:

 

·         Secure the voice and data fabric of the network given new requirements for security;

·         Empower employees of the enterprise to maximize productivity;

·         Drive down the cost of securing the enterprise; and

·         Deliver the information concerning security that must be managed.

 

They will also be able to continually evolve to respond to new and increasingly sophisticated security threats, the growth of cybercrime and the introduction of new regulations.

Enabling the Application & Content Provider: Collaboration for Innovation

By offering their partners access to their network intelligence, network operators can foster a more trusting, more equitable relationship with ACPs, prompting them to not only develop more applications and content faster, but to tailor them to targeted subscribers, creating a more viable and predictable revenue model.

Featured Events