Tag Archives: Wireline

Broadband gaps impact every member of Congress

By Adie Tomer – Digital connectivity is the glue of the modern American economy. From rural farmers to city business leaders, every industry relies on broadband to track markets, connect with customers, and sell their products. The American household is equally reliant on broadband, whether its kids bringing home their digital classrooms, adults telecommuting to their jobs, or whole families streaming video content to their televisions. And governments at all levels can use digital platforms to improve service delivery and reduce costs.

Yet for all of broadband’s economic benefits, the country continues to face a significant digital divide at the household level.

Without seamless digital connectivity, many households are at-risk of falling further behind in the country’s advanced economy.

While Congress considers policies related to expanding broadband availability, there is little to no legislative activity related to broadband adoption. more>

You Can’t Solve These Problems on an Ad Hoc Basis

By Sasha Cohen O’Connell – Resolving today’s most pressing cyber security and Internet governance challenges is dependent on the tech industry and the government working together on both policy development and policy implementation.

Specifically, collaboration is required to successfully research, design, debate, and ultimately implement effective solutions.

While there is overwhelming consensus on the need for collaboration, it remains a huge challenge. Why?

While many factors contribute to the problem, including differing incentive structures, cultures and business models, one critical element—organizational structure—is a significant and often overlooked hurdle that needs attention and creative solutions.

Most collaborations today are done by ad hoc teams of operational personnel, lawyers, government affairs departments, and/or trade associations or other outside third parties. This setup is neither efficient nor effective. more> https://goo.gl/B0j8RA

In 2017, Cost Per Bit Exceeds Revenues

By Carol Wilson – This is the year when most telecom network operators will see their revenue-per-bit fall below their cost-per-bit, says a veteran industry analyst, and that financial reality is going to reverberate through the industry for at least the next two years, prompting further consolidation and cuts by network gear makers, as operator capex budgets shrink.

Companies such as AT&T Inc. (NYSE: T) have been very open in saying the revenue-cost crossover drives their aggressive transformation efforts, because they recognize it is impossible to meet bandwidth requirements of the future doing things the way they’ve been done in the past.

That will mean continued price pressure on equipment vendors, CIMI Corp. CEO Tom Nolle, maintains. He points to declining revenues, quarter over quarter, for companies such as Cisco Systems Inc. (Nasdaq: CSCO), and to the fact that Huawei Technologies Co. Ltd. is alone among vendors in growing its revenues because it is a price leader in many categories.

The analyst expects 2017 and 2018, at minimum, to be pretty bleak years for the telecom equipment space. more> https://goo.gl/ayoS7W

ITU releases annual global ICT data and ICT Development Index country rankings

ITU – The Measuring the Information Society Report is widely recognized as the repository of the world’s most reliable and impartial global data and analysis on the state of global ICT development and is extensively relied upon by governments, international organizations, development banks and private sector analysts and investors worldwide.

“To bring more people online, it is important to focus on reducing overall socio-economic inequalities,” said ITU Secretary-General Houlin Zhao. “Education and income levels are strong determinants of whether or not people use the Internet.”

An increasingly ubiquitous, open, fast and content-rich Internet has changed the way many people live, communicate, and do business, delivering great benefits for people, governments, organizations and the private sector. However, many people are still not using the Internet, and many users do not fully benefit from its potential.

  • Most people have access to Internet services but many do not actually use them.
  • The full potential of the Internet remains untapped.
  • Access to the Internet is not enough; policy-makers must address broader socio-economic inequalities and help people acquire the necessary skills to take full advantage of the Internet.
  • Many people still do not own or use a mobile phone.
  • Affordability is the main barrier to mobile-phone ownership.
  • Asia and the Pacific has the lowest average purchasing power parity (PPP) $ price for mobile-cellular services of all regions.
  • Fixed-broadband prices continued to drop significantly in 2015 but remain high – and clearly unaffordable – in a number of LDCs.
  • Mobile-broadband is cheaper and more widely available than fixed-broadband, but still not deployed in the majority of LDCs (Least Developed Countries).

Mobile phone adoption has largely been monitored based on mobile-cellular subscription data since these are widely available and regularly collected and disseminated by regulators and operators.

At the end of 2016, there are almost as many mobile-cellular subscriptions as people on earth and 95% of the global population lives in an area that is covered by a mobile-cellular signal. However, since many people have multiple subscriptions or devices, other metrics need to be produced to accurately assess mobile uptake, such as the number of mobile phone users or mobile phone owners. more> https://goo.gl/L3Nh90

Related>

AT&T opens itself up to activist attack

By Rob Cox – AT&T’s $85 billion takeover of Time Warner looks like a deal from another era. Back around the turn of the millennium, corporate chieftains roamed the global capital markets freely, buying rivals at random and running roughshod over shareholders, unencumbered by vigilant boards or uppity investors.

In this profligate epoch, the Hollywood studio was a popular plaything.

In most sensible acquisitions, a buyer promises to reduce expenses in the combination, diluting the financial impact to its owners. AT&T does say it will target $1 billion in savings, but given the absence of overlap, it’s a dubious pledge.

“Most of these,” posits Cowen analyst Colby Synesael of the synergies, “will come from what will likely be meaningful headcount cuts within AT&T that were likely to occur regardless of whether AT&T was acquiring Time Warner.”

What can embittered AT&T shareholders do? They don’t get to vote on the Time Warner deal, thanks to the crafty workings of Stephenson and the board. Beyond a rival bid that rescues them or regulators squashing the plan, investors determined to put a stop to the madness could enlist the services of a modern-day white knight of sorts: an activist. more> https://goo.gl/qH2Vfl

The Digital Divide Is About Much More Than Access

By Rick Paulas – If you look at the numbers, it doesn’t seem like America has much of a digital divide anymore. A new survey of low- and moderate-income families shows that 94 percent of them have Internet access.

Except, the divide hasn’t actually closed. The pace and necessity of Internet-based technology has simply created other inequities. The question we need to consider is the quality of that access.

Dig deeper into the survey data, and you can see the problem with those accessibility numbers.

Of the 94 percent of families that “have” Internet access, 52 percent of them report having slow Internet, 26 percent complain about having to share a computer with too many people in their household, 20 percent say their Internet has been shut off over the past year due to lack of payment, and eight percent are still using dial-up.

Not all Internet is created equal. more> http://goo.gl/yj7hLy

Why Is Embedded Security So Difficult?


By Alan Grau [2] – There are a number of reasons that embedded security is hard. A few of the top challenges include:

  • The low cost of attack
  • The weakest link problem
  • A lack of expertise and training

It’s very easy, when talking about cybersecurity, to focus on the various technical aspects of building a secure device.

Security is only as strong as its weakest link. As security is a system issue, not just a device issue, there is a very long chain of possible attack points that must be secured. more> http://goo.gl/6U1IHZ

Related>

How to keep the Internet free and innovative

By Ryan Radia – Unless the courts or Congress rein it in, the Federal Communications Commission (FCC) might soon transform itself into the Internet Regulation Commission.

To understand the FCC’s latest power grab, think back to 1996 — the year America Online introduced its unlimited dial-up service.

That’s the last time Congress rewrote federal telecom laws, albeit making barely any mention of the Internet. One new provision, Section 706, instructed the FCC and the states to use their powers to encourage the expansion of speedy Internet access and promote infrastructure investment.

This provision sounds simple enough, but as current FCC leadership sees it, the law is an invitation for potentially boundless regulation. more> http://goo.gl/JLFxo0

How Lockheed Martin, Cisco and PWC manage cybersecurity

By Bruce Harpham – Talented information security professionals remain the linchpin of a successful cybersecurity program.

Several employment surveys have found that security skills continue to be in high demand, and some high profile security jobs can command salaries over $200,000 per year.

A major part of Lockheed’s security success comes down to the organization’s talent strategy.

“When I bring a new security analyst into Lockheed, they have the opportunity to rotate through several groups: Lockheed’s internal security unit, the group serving government clients and work with our commercial clients,” Angela Heise shared.

“We empower our security staff by giving them a say in the tools they use and help them develop their careers,” she continued.

Diversity and cross-generational cooperation is another opportunity. more> http://goo.gl/EFjyYM

5 Cybersecurity Truths to Know Now


By Peter Galvin – Below are five key points about cybersecurity today that will help you strengthen your defenses to keep your data secure.

  • Common security failures have enabled cyberattacks to cause significant damage to businesses
  • These failures include:
    ⚬ Weak security hygiene
    ⚬ Insufficient Data Protection

  • Attack vectors continue to shift
  • Private key extraction is a real threat
  • Cyber criminals’ focus is now primarily data theft …
  • High-security environments need trusted storage …

As technology evolves, so do attack methods. more> http://tinyurl.com/p3ed3zt

Related>