With US subscribers checking their smartphones 8 billion times a day – Is your network making the best First-Connection Impression?
You’ll never get a second chance to make a great first impression.” We’ve all heard that an interviewer, or a stranger at a party, will form an impression of you, … Continue reading
The Top 5 LTE Protection Domains
Security has become a hot topic among LTE operators. While the attention focuses almost exclusively on mobile devices, they are far from being the only targets for attack and entry … Continue reading
NFV Disrupts Carrier Models
Network Functions Virtualization (NFV) is igniting the next evolution in mobile networking. In less than 10 years, UMTS (3G) and rapid adoption of smart phone and applications have revolutionized subscribers’ … Continue reading
Innovate with Voice
A recent Wall Street Journal article challenged mobile operators to relook the mobile business model with fresh eyes and warned operators that wireless Wi-Fi Calling and text messaging services soon … Continue reading
Mobile Security – Worth 10X the Investment
From time to time, I hear comments from operators or analysts about the “high costs” of securing the LTE RAN-core border (i.e., encrypting with IPsec). Costs in the “tens of … Continue reading
From ‘Hygiene’ to Differentiator: the changing role of mobile security
One of the more provocative discussions at the 2014 Light Reading Mobile network Security Strategies conference in London centered around the changing role of security in the public view and … Continue reading