Next Generation Communications Blog

Like Parasailing

Just drifting along on the wind like a leaf on a stream. You don't control your own destiny. What do you...

Full Story »

Birch Buys Globalinx

It seems that Birch is acquiring more customers. In a surprise move (to me because where are they getting the money...

Full Story »

Why Carriers and WebRTC Don't Have to be the Same Magnet Polarization and Can be Partners Part II

Last week, I started exploring why WebRTC is interesting for carriers and wrote about extending existing applications with WebRTC to keep...

Full Story »

NFV INSIGHTS: Preparing for the future of NFV

By: Andreas Lemke, Ph.D. - Alcatel-Lucent

ALU.Hack.2.23.15.JPG


Have you ever gotten your hands dirty and really implemented an NFV or SDN application? Six teams from academia and industry in Israel and Europe can answer with a resounding yes! These teams gathered in Haifa at the 4-day 2015 Winter School and Hackathon event, organized by Bell Labs, Alcatel-Lucent’s CloudBand team and Israel’s leading Institute of Technology, Technion. The event offered a full program to get acquainted with the fundamental concepts behind cloud computing, software defined networking (SDN) and network functions virtualization (NFV).

Full Story »

What's Left to MegaPath

In 2010, Speakeasy and Covad got married to MegaPath to make a $500 million MSLEC (as they announced it). In 2012,...

Full Story »

ITEXPO Miami 2015 Videos Being Posted

If you missed ITEXPO a few weeks back in Miami, FL – I am sorry to hear that… It was one of...

Full Story »

VoWiFi extends and enriches LTE services

By: David E. Nowoswiat, Senior Product and Solutions Marketing Manager, IP Routing & Transport, and  Ed Elkin, Head of Marketing for IP Communication, Alcatel-Lucent

The growing importance and usage of Wi-Fi™ is spurring rapid development in voice over Wi-Fi (VoWiFi) to complement robust VoLTE services. Mobile device manufacturers are taking advantage of Wi-Fi to solidify their relationship with consumers and enterprises, so mobile network operators (MNOs) need to act quickly to secure a share in the hot Wi-Fi market. By developing a strategy that encompasses Wi-Fi, MNOs can leverage their most important asset - their LTE network - to deliver a seamless experience for subscribers while leveraging their virtualized IMS investment to create  new revenue opportunities for themselves.

Full Story »

Collaborative Security: Shifting the Security Paradigm to Create Innovative Enterprise Security Solutions

In today's age of Web 2.0 and cloud computing, security can actually be a positive enabler for driving business performance. To achieve this objective, enterprises can benefit from having a corporate-wide strategy, or a "security blueprint," that allows the enterprise to be open for business and provides a trusted environment.   On the other side of the coin, the rapid growth in communications technology has been accompanied by a similarly swift increase in security threats, cybercrime and the introduction of correlated security regulations.   According to an Alcatel-Lucent white paper, "Created the Trusted, Dynamic Enterprise," early in 2009 industry experts presenting to the U.S. Senate committee hearing on improving cyber security estimated profits from the cybercrime economy totaled close to $1 trillion - more than the cash generated by drug crime.

Using communications to reduce climate change impact

At its Bell Labs facilities, and through its work with the CTVR, Alcatel-Lucent is looking to drive R&D efforts that will bring such energy efficient technologies to the next generation communications environment, helping reduce the carbon emissions from telecom equipment, which now stands at about two percent of the global carbon emissions, but is set to grow significantly in the coming years without such efforts from Alcatel-Lucent and the CTVR.

How can the Telecom sector use applications and services to enable other industries and consumers reduce their impact on the environment?

It's clear that businesses are looking to become more environmentally responsible - though largely because of the cost savings that are inherent to "going green." Regardless, the telecom sector, thanks to the proliferation of IP networking solutions and eco-friendly technologies, are in a position to play a major role in driving greenhouse gas reduction and energy conservation in the global business environment.

Technical, product leadership and the ability to test solutions prior to deployment: Why these attributes are key for LTE deployments

Yes, it's still all about the applications and content, but in order to effectively introduce the next generation of bandwidth-intensive services, operators have to take the time and effort to ensure success. Alcatel-Lucent not only provides the technology expertise to support an intelligent migration strategy, but is providing a forum for ongoing collaboration that will benefit the entire community - from network operators to end users.

How can I enable a single, unified sign on for my customers across multiple screens?

By leveraging technology like Alcatel-Lucent's TPSDA, operators will be able to eliminate the traditional gaps between different devices and different access technologies, unifying all services for their subscribers on a single architecture.

Key Factors Driving the Need for a Comprehensive Security Blueprint

A recent U.S. Government Accountability Office report warned that cyber-threats facing federal networks and the country's critical infrastructure are becoming increasingly sophisticated. And while the number of attacks is exponentially growing - security incidents grew by over 200 percent from fiscal year 2006 to fiscal year 2008 - the report concludes that the country is not optimally prepared to protect itself from such attacks.

Although this particular report is in reference to government networks, enterprise security is as vulnerable, if not more so. Rapid advances in communications technology have been accompanied by an equally rapid increase in security threats, the growth of cybercrime and the introduction of new security regulations.

Leveraging Strategic Collaboration to Enhance Network Operations and Service Offerings

Given the state of the market, operators need a new strategy to differentiate and compete successfully. Reducing capital and operating expenses and generating new revenue while defining the business models that can help in meeting critical business goals is one place to begin such an endeavor.   In fact, according to an Alcatel Lucent whitepaper, studies show that outsourcing and infrastructure sharing can help operators increase their free operating cash flow by as much as 10 percent.   The latest trend is for fixed, fixed-mobile and mobile operators to work together to deliver broadband services. For example, cable television providers are offering multimedia content, high-speed Internet access and voice services.

A look at the future: Re-defining the communications partner ecosystem

The services and capabilities that have, until now, served carriers well, are only a part of what subscribers are demanding - they want more services and applications, more access, and more integration with their various access devices and networks.

Best practices for managing events, policy and traffic on your network

Through its two components - the Alcatel-Lucent 9900 Detector (deployed in the packet core) and the Alcatel-Lucent 9900 Central (deployed in the NOC) - the 9900 WNG delivers a significant advantage to wireless operators looking for an edge over their competition, providing advantages in a number of areas, including operations, planning, security, engineering, marketing, and revenue assurance.

Top Benefits of Web 2.0 and Cloud Computing in a Business Environment

Rapid advancements in communications technology have been accompanied by an equally swift multiplication in security threats, a growth in cybercrime as well as the introduction of new security regulations.

 

Despite security concerns, according to a recent study, a majority of executives polled by Deloitte - 60.9 percent - believe cloud computing will be a transformative technology in the industry and can drive financial benefits, or at least be useful for certain kinds of enterprise services.

 

Web 2.0, which allows information to be sourced from many locations and displayed as composite parts of new applications, is changing the way enterprises use the Internet for business interactions with employees, customers, partners and suppliers, according to a recent Alcatel Lucent whitepaper.

 

Company officials contend that cloud computing "is on the horizon with the promise to reduce costs by creating virtual computing 'clouds' in cyberspace."

 

New business models enabled by Web 2.0 and cloud computing are indeed creating more challenges by externalizing business processes and moving them to cyberspace where there is less control of private data and the traditional enterprise perimeter can no longer provide a sufficient defense.

 

The new business models are being rapidly adopted without mastering how to make the technology less vulnerable, according to Alcatel Lucent officials. As companies embrace mobile communications, enable employees to work from remote locations, and co-market and sell with partners, the enterprise IT team needs to respond with new security methods to keep the enterprise secure.

 

As such, an advanced and secured communications network is the key to enabling an enterprise to respond to this new business environment and become a dynamic enterprise.

 

According to the Deloitte survey, cloud computing enthusiasm was somewhat tempered by executives' concern over security and privacy, as 34.6 percent cited these issues as the largest considerations for adopting cloud computing in their organizations.

 

However, by following a user-centric security blueprint, enterprises will be positioned to leverage new business models made possible by Web 2.0, cloud computing and mobile communications technology.

 

According to Alcatel Lucent, this blueprint describes the elements required to:

 

·         Secure the voice and data fabric of the network given new requirements for security;

·         Empower employees of the enterprise to maximize productivity;

·         Drive down the cost of securing the enterprise; and

·         Deliver the information concerning security that must be managed.

 

They will also be able to continually evolve to respond to new and increasingly sophisticated security threats, the growth of cybercrime and the introduction of new regulations.

Featured Events