Next Generation Communications Blog

Fascinating WebRTC Demos from WebRTC Expo

WebRTC has been described as the most disruptive communications technology of the decade. It has also been described as overhyped. Well, I...

Full Story »

Restoration Hardware's E-commerce Fighting Formula

A Tasteful Blend of Starbucks and Apple Retail Experiences designed to make customers fall in loveApple has the most valuable retail real...

Full Story »

Thoughts on ThinkGeek Customer Service

I’m on the phone with ThinkGeek because I purchased something which they shipped incorrectly. I tried email and didn’t get a...

Full Story »

The Interworking Function (IWF) part of the Diameter Signaling Controller (DSC) now takes center stage

Diameter Signaling Controllers (DSCs) are the general term used to describe products that enable load balancing and scaling of Diameter signaling...

Full Story »

New T-Mobile Pay as You Go LTE Pricing Changes Everything

Until recently, if you wanted a real data plan on a major carrier while using your cell phone, you were forced...

Full Story »

How Sony May be Fighting to Unleak its Information

The recent attack on Sony Pictures Entertainment is about as scary as it gets as emails which insulted the company’s hired talent...

Full Story »

4 Tips for the Busy Executive

I have a couple of prospective clients that keep delaying projects. One really wants to do the project but the people...

Full Story »

How can I enable a single, unified sign on for my customers across multiple screens?

By leveraging technology like Alcatel-Lucent's TPSDA, operators will be able to eliminate the traditional gaps between different devices and different access technologies, unifying all services for their subscribers on a single architecture.

Key Factors Driving the Need for a Comprehensive Security Blueprint

A recent U.S. Government Accountability Office report warned that cyber-threats facing federal networks and the country's critical infrastructure are becoming increasingly sophisticated. And while the number of attacks is exponentially growing - security incidents grew by over 200 percent from fiscal year 2006 to fiscal year 2008 - the report concludes that the country is not optimally prepared to protect itself from such attacks.

Although this particular report is in reference to government networks, enterprise security is as vulnerable, if not more so. Rapid advances in communications technology have been accompanied by an equally rapid increase in security threats, the growth of cybercrime and the introduction of new security regulations.

Leveraging Strategic Collaboration to Enhance Network Operations and Service Offerings

Given the state of the market, operators need a new strategy to differentiate and compete successfully. Reducing capital and operating expenses and generating new revenue while defining the business models that can help in meeting critical business goals is one place to begin such an endeavor.   In fact, according to an Alcatel Lucent whitepaper, studies show that outsourcing and infrastructure sharing can help operators increase their free operating cash flow by as much as 10 percent.   The latest trend is for fixed, fixed-mobile and mobile operators to work together to deliver broadband services. For example, cable television providers are offering multimedia content, high-speed Internet access and voice services.

A look at the future: Re-defining the communications partner ecosystem

The services and capabilities that have, until now, served carriers well, are only a part of what subscribers are demanding - they want more services and applications, more access, and more integration with their various access devices and networks.

Best practices for managing events, policy and traffic on your network

Through its two components - the Alcatel-Lucent 9900 Detector (deployed in the packet core) and the Alcatel-Lucent 9900 Central (deployed in the NOC) - the 9900 WNG delivers a significant advantage to wireless operators looking for an edge over their competition, providing advantages in a number of areas, including operations, planning, security, engineering, marketing, and revenue assurance.

Top Benefits of Web 2.0 and Cloud Computing in a Business Environment

Rapid advancements in communications technology have been accompanied by an equally swift multiplication in security threats, a growth in cybercrime as well as the introduction of new security regulations.

 

Despite security concerns, according to a recent study, a majority of executives polled by Deloitte - 60.9 percent - believe cloud computing will be a transformative technology in the industry and can drive financial benefits, or at least be useful for certain kinds of enterprise services.

 

Web 2.0, which allows information to be sourced from many locations and displayed as composite parts of new applications, is changing the way enterprises use the Internet for business interactions with employees, customers, partners and suppliers, according to a recent Alcatel Lucent whitepaper.

 

Company officials contend that cloud computing "is on the horizon with the promise to reduce costs by creating virtual computing 'clouds' in cyberspace."

 

New business models enabled by Web 2.0 and cloud computing are indeed creating more challenges by externalizing business processes and moving them to cyberspace where there is less control of private data and the traditional enterprise perimeter can no longer provide a sufficient defense.

 

The new business models are being rapidly adopted without mastering how to make the technology less vulnerable, according to Alcatel Lucent officials. As companies embrace mobile communications, enable employees to work from remote locations, and co-market and sell with partners, the enterprise IT team needs to respond with new security methods to keep the enterprise secure.

 

As such, an advanced and secured communications network is the key to enabling an enterprise to respond to this new business environment and become a dynamic enterprise.

 

According to the Deloitte survey, cloud computing enthusiasm was somewhat tempered by executives' concern over security and privacy, as 34.6 percent cited these issues as the largest considerations for adopting cloud computing in their organizations.

 

However, by following a user-centric security blueprint, enterprises will be positioned to leverage new business models made possible by Web 2.0, cloud computing and mobile communications technology.

 

According to Alcatel Lucent, this blueprint describes the elements required to:

 

·         Secure the voice and data fabric of the network given new requirements for security;

·         Empower employees of the enterprise to maximize productivity;

·         Drive down the cost of securing the enterprise; and

·         Deliver the information concerning security that must be managed.

 

They will also be able to continually evolve to respond to new and increasingly sophisticated security threats, the growth of cybercrime and the introduction of new regulations.

Enabling the Application & Content Provider: Collaboration for Innovation

By offering their partners access to their network intelligence, network operators can foster a more trusting, more equitable relationship with ACPs, prompting them to not only develop more applications and content faster, but to tailor them to targeted subscribers, creating a more viable and predictable revenue model.

Alcatel-Lucent Turns Focus to Green IT, Launches Eco-Sustainability Site

To supports its global eco-sustainability campaign, Alcatel-Lucent has recently launched its new Eco-sustainability Web site, which details its corporate mission to promote environmentally aware communications technology across the globe.

Competition vs. Collaboration: Strategies for New Revenue Generation

The idea is that working in tandem with other industry experts facilitates more rapid development of products that will be more widely available, more reliable, and more cost effective to develop. In addition, market acceptance is increased due to the collaborative nature of the product(s) - there is less hesitation resulting from the perception of single-vendor bias.

What is the impact of new IP applications on wireless networks?

Depending on the specific applications and their automatic or manual refresh sequences, and the nework dormancy timer (the maximum time before a connection is automatically deactivated after non-usage), and, of course, download speeds, a recent Alcatel-Lucent white paper describers how different variations on a single application can result in significant differences in transmission loads and the number of signaling events in a one-hour actual RF airtime span.

Featured Events