The Internet of Things (IoT) is one of those important technological developments on which the digitial transformation process is based. Studies that predict an extremely rapid expansion frequently see the daylight, but in the real world the IoT technologies' trayectory can be compared to that of a boomerang.
Launching Voice over LTE (VoLTE) and Voice over WiFi (VoWiFi) has for some time been seems to be yet “another” large project operators are undertaking with more or less success and driven both by the need for operational efficiencies and customer demands.
The question is whether the colossal time and efforts that are being spent by operators to make the efficient IP-only LTE (or 4G) networks backward compatible will ever payoff? The main drivers seem to be efficiencies in spectrum and the promise of being able to provide convergent services based on IP. Moving voice calls to data networks at least in theory means a simpler network to manage and thus lower operational costs. Other industries such as digital and media have been successfully delivering these types of services for years, eating into the two cash-cows on which telecoms has been built, namely voice and messaging, only at a fraction of the investment.
The DevOps paradigm is really cool. Everyone wants to deploy their environments with Puppet on top of OpenStack. It brings reproducibility and scalability at a tremendous speed. This is simply awesome and undoubtedly the way to go forward.
Almost nobody will discuss the benefits of adopting a standard DevOps paradigm, but this implies a major shift in mindset for most companies, especially Telcos, which have a high moment of inertia. In this article we will describe a success story based on our experience with customers.
Are traditional monitoring solutions ready for the software defined world (SDN/NFV) and the Internet of things (IoT)? Not always, in our opinion. In many cases they are not ready for the increasing flow of data originating from such a heterogeneous range of sources, in such diverse formats and through so many and diverse protocols.
BlueTC has just passed its first 10-year mark in business. It has been an intense decade in which the telecommunications sector has evolved in a vertiginous way and during which our company has remained faithful to its mission: Generate value for its customers within new technology areas and via the development of a specialised offering. In parallel, we have created an operational structure that enables us to deliver services globally.
BlueTC acaba de cumplir diez años de existencia. Ha sido una década muy intensa, en la que el sector de las telecomunicaciones ha evolucionado de forma vertiginosa y en la que nuestra compañía ha sabido mantenerse fiel a su objetivo original: Generar valor para el negocio de sus clientes en nuevas áreas y tecnologías a través del desarrollo de una oferta especializada. En paralelo hemos ido desarrollando una estructura operacional que permite la entrega de servicios a nivel global.
Big Data and how to best benefit from it is a hot topic and will continue to be so in 2016 and for many years to come. Nowadays, there is no sector or industry that is not channeling huge efforts and resources into this area.
Quality of Service and Service Assurance Equally Important When Buying Network Access
SIP has enjoyed wide adoption as a signalling standard within telecom because of it's flexibility. The standard defines the length and composition of a message composed of letters and numbers. This inherent flexibility means the standard is open to interpretation when it comes to practical implementation.
If you are reading this you are likely to be someone from mobile in telecoms and are likely to be involved with product management, operations or testing and we encourage you to read on.
European mobile operators are currently preparing and verifying their core and radio networks for the introduction of voice and video calls and other innovative services over LTE.
Mobile network security is on top of the operators’ agenda and is discussed extensively at network security conferences and other industry events. This is partly due to the fact that security threats and attacks are increasing in numbers and becoming more and more sophisticated. At a recent international Network Security Conference, a range of topics around mobile network security policy were thoroughly discussed. The overriding impression was, though, that the network security issue seemed to be focused almost purely on the end devices and the security around these. Little was mentioned regarding the implications of moving from a circuit switched network to an all IP network and thus the exposure of the VoIP/IMS network to new security issues.
Mid December 2013, BlueTC held its annual employee event together with our family and friends, now a tradition that many of the “BlueTC family” looks forward to. Actually, from early autumn and onwards, emails asking about the event date and chosen film fill up my in-box. And as soon as the invitation was formally sent, many of you started securing tickets. So finally, we almost managed to fill two entire theatres that had been booked exclusively for BlueTC, one with the Spanish and one with the original version, more than 400 people in total!
As the telecommunication services evolve with the subscribers’ applications in today’s networks, there is a growing disconnection between the perception of quality of the services the operators provide, and the actual quality perceived by their customers. As Ericsson points out on a recent paper, “The quality of user experience has always been important for operators. However, with the rise of mobile-broadband and smartphone usage over the past few years, the meaning of user experience has changed dramatically”. The issue has to do with the lack of visibility that the operator has beyond their network devices in the Radio Access Network (RAN) and the Core Network, where they cannot measure the actual connectivity the customers have on their ends. Measuring the cells power or the aggregated throughput in the core, is not the same as knowing that an important customer has a weak coverage, or his application is timing-out because of high latency in the communication.