NOTE! This site uses cookies and similar technologies.

Please, Accept to improve your experience of this site. Learn more

I Accept

Unlocking the full potential of IoT through quality assurance (IoT Now)

Achieving the kind of digital transformation required to implement a successful IoT initiative requires changes that must span the closely intertwined areas of strategy, processes and technology, breaking down traditional organisational and technical silos. Companies should closely examine every relevant area of their own business processes and commit to an ongoing plan of continuous improvement if they’re to reap the very real benefits of the IoT vision. This obviously also applies to the networks and connectivity domains that underpin any IoT offering and which must support increasingly complex value and revenue chains.

Roaming, el talón de Aquiles del M2M (Computing)

La confianza es buena, pero el control es mejor. Digo esto porque, hoy en día, la gran mayoría de operadores y organizaciones que emprenden proyectos M2M se contentan con que sus dispositivos dispongan de una conexión, pero no se preocupan de saber si esa conexión cuenta con la suficiente calidad para garantizar que el servicio se desarrolle de forma apropiada. El problema se agrava cuando es necesario utilizar varias redes, como es el caso en escenarios de roaming. Es posible que los operadores partners ofrezcan una calidad aceptable, pero también puede haber grandes diferencias entre ellos.

Assuring quality of service in M2M and IoT connectivity (M2M Now)

Despite being a key building block of any wider M2M solution, there are important differences between M2M connectivity services and traditional mobile services that need careful consideration as these, by definition, can’t provide human feedback. On top of this, many M2M users need global connectivity, which in turn involves international roaming partners. Is trusting global roaming partners sufficient or should the market demand a more sophisticated approach from those operators providing M2M services - in particular where mission-critical M2M/IoT services are involved, asks Miguel Angel García Matatoros, managing director, Blue Telecom Consulting.

This IoT Masterclass is intended for operators and MVNOs who provide connectivity services via cellular to M2M businesses and for companies who already employ or are planning to implement M2M/IoT technologies in their businesses.

BlueTC presenta NFV Security, un sistema de detección de intrusiones para redes IMS virtuales e híbridas, en el MWC 2015 (Comunicaciones Hoy)

Blue Telecom Consulting (BlueTC), consultora internacional especializada en el sector de las telecomunicaciones que ofrece servicios y soluciones innovadores para operadores y fabricantes de equipos de red, aprovecha su presencia como expositor en el GSMA Mobile World Congress para realizar sus primeras demostraciones de NFV Security.

 Protection of critical telecom network resources

Protection of Critical Telecom Network Resources (Telecom Know How)

Sophisticated attacks require real time intrusion detection and analytics

This article focuses on mobile network security rather than on the devices themselves. The author claims that although the security issues around mobile devices are highly relevant, it is one only of several areas which needs to be carefully considered in an end-to-end network security perspective. The transition to all-IP networks are calling for new tools and solutions.

Propuestas de Valor enfocadas a la Optimización y Evolución de las Redes de Telecomunicación (Comunicaciones Hoy)

El modelo de consultoría de BlueTC está basado en un proceso de generación de valor de los ámbitos de la optimización y la evolución de las redes de telecomunicación. Este proceso se alimenta de propuestas innovadoras que, a su vez, se materializan en soluciones a medida para sus clientes.