Tag Archives: Wireline

In 2017, Cost Per Bit Exceeds Revenues

By Carol Wilson – This is the year when most telecom network operators will see their revenue-per-bit fall below their cost-per-bit, says a veteran industry analyst, and that financial reality is going to reverberate through the industry for at least the next two years, prompting further consolidation and cuts by network gear makers, as operator capex budgets shrink.

Companies such as AT&T Inc. (NYSE: T) have been very open in saying the revenue-cost crossover drives their aggressive transformation efforts, because they recognize it is impossible to meet bandwidth requirements of the future doing things the way they’ve been done in the past.

That will mean continued price pressure on equipment vendors, CIMI Corp. CEO Tom Nolle, maintains. He points to declining revenues, quarter over quarter, for companies such as Cisco Systems Inc. (Nasdaq: CSCO), and to the fact that Huawei Technologies Co. Ltd. is alone among vendors in growing its revenues because it is a price leader in many categories.

The analyst expects 2017 and 2018, at minimum, to be pretty bleak years for the telecom equipment space. more> https://goo.gl/ayoS7W

ITU releases annual global ICT data and ICT Development Index country rankings

ITU – The Measuring the Information Society Report is widely recognized as the repository of the world’s most reliable and impartial global data and analysis on the state of global ICT development and is extensively relied upon by governments, international organizations, development banks and private sector analysts and investors worldwide.

“To bring more people online, it is important to focus on reducing overall socio-economic inequalities,” said ITU Secretary-General Houlin Zhao. “Education and income levels are strong determinants of whether or not people use the Internet.”

An increasingly ubiquitous, open, fast and content-rich Internet has changed the way many people live, communicate, and do business, delivering great benefits for people, governments, organizations and the private sector. However, many people are still not using the Internet, and many users do not fully benefit from its potential.

  • Most people have access to Internet services but many do not actually use them.
  • The full potential of the Internet remains untapped.
  • Access to the Internet is not enough; policy-makers must address broader socio-economic inequalities and help people acquire the necessary skills to take full advantage of the Internet.
  • Many people still do not own or use a mobile phone.
  • Affordability is the main barrier to mobile-phone ownership.
  • Asia and the Pacific has the lowest average purchasing power parity (PPP) $ price for mobile-cellular services of all regions.
  • Fixed-broadband prices continued to drop significantly in 2015 but remain high – and clearly unaffordable – in a number of LDCs.
  • Mobile-broadband is cheaper and more widely available than fixed-broadband, but still not deployed in the majority of LDCs (Least Developed Countries).

Mobile phone adoption has largely been monitored based on mobile-cellular subscription data since these are widely available and regularly collected and disseminated by regulators and operators.

At the end of 2016, there are almost as many mobile-cellular subscriptions as people on earth and 95% of the global population lives in an area that is covered by a mobile-cellular signal. However, since many people have multiple subscriptions or devices, other metrics need to be produced to accurately assess mobile uptake, such as the number of mobile phone users or mobile phone owners. more> https://goo.gl/L3Nh90


AT&T opens itself up to activist attack

By Rob Cox – AT&T’s $85 billion takeover of Time Warner looks like a deal from another era. Back around the turn of the millennium, corporate chieftains roamed the global capital markets freely, buying rivals at random and running roughshod over shareholders, unencumbered by vigilant boards or uppity investors.

In this profligate epoch, the Hollywood studio was a popular plaything.

In most sensible acquisitions, a buyer promises to reduce expenses in the combination, diluting the financial impact to its owners. AT&T does say it will target $1 billion in savings, but given the absence of overlap, it’s a dubious pledge.

“Most of these,” posits Cowen analyst Colby Synesael of the synergies, “will come from what will likely be meaningful headcount cuts within AT&T that were likely to occur regardless of whether AT&T was acquiring Time Warner.”

What can embittered AT&T shareholders do? They don’t get to vote on the Time Warner deal, thanks to the crafty workings of Stephenson and the board. Beyond a rival bid that rescues them or regulators squashing the plan, investors determined to put a stop to the madness could enlist the services of a modern-day white knight of sorts: an activist. more> https://goo.gl/qH2Vfl

The Digital Divide Is About Much More Than Access

By Rick Paulas – If you look at the numbers, it doesn’t seem like America has much of a digital divide anymore. A new survey of low- and moderate-income families shows that 94 percent of them have Internet access.

Except, the divide hasn’t actually closed. The pace and necessity of Internet-based technology has simply created other inequities. The question we need to consider is the quality of that access.

Dig deeper into the survey data, and you can see the problem with those accessibility numbers.

Of the 94 percent of families that “have” Internet access, 52 percent of them report having slow Internet, 26 percent complain about having to share a computer with too many people in their household, 20 percent say their Internet has been shut off over the past year due to lack of payment, and eight percent are still using dial-up.

Not all Internet is created equal. more> http://goo.gl/yj7hLy

Why Is Embedded Security So Difficult?

By Alan Grau [2] – There are a number of reasons that embedded security is hard. A few of the top challenges include:

  • The low cost of attack
  • The weakest link problem
  • A lack of expertise and training

It’s very easy, when talking about cybersecurity, to focus on the various technical aspects of building a secure device.

Security is only as strong as its weakest link. As security is a system issue, not just a device issue, there is a very long chain of possible attack points that must be secured. more> http://goo.gl/6U1IHZ


How to keep the Internet free and innovative

By Ryan Radia – Unless the courts or Congress rein it in, the Federal Communications Commission (FCC) might soon transform itself into the Internet Regulation Commission.

To understand the FCC’s latest power grab, think back to 1996 — the year America Online introduced its unlimited dial-up service.

That’s the last time Congress rewrote federal telecom laws, albeit making barely any mention of the Internet. One new provision, Section 706, instructed the FCC and the states to use their powers to encourage the expansion of speedy Internet access and promote infrastructure investment.

This provision sounds simple enough, but as current FCC leadership sees it, the law is an invitation for potentially boundless regulation. more> http://goo.gl/JLFxo0

How Lockheed Martin, Cisco and PWC manage cybersecurity

By Bruce Harpham – Talented information security professionals remain the linchpin of a successful cybersecurity program.

Several employment surveys have found that security skills continue to be in high demand, and some high profile security jobs can command salaries over $200,000 per year.

A major part of Lockheed’s security success comes down to the organization’s talent strategy.

“When I bring a new security analyst into Lockheed, they have the opportunity to rotate through several groups: Lockheed’s internal security unit, the group serving government clients and work with our commercial clients,” Angela Heise shared.

“We empower our security staff by giving them a say in the tools they use and help them develop their careers,” she continued.

Diversity and cross-generational cooperation is another opportunity. more> http://goo.gl/EFjyYM

5 Cybersecurity Truths to Know Now

By Peter Galvin – Below are five key points about cybersecurity today that will help you strengthen your defenses to keep your data secure.

  • Common security failures have enabled cyberattacks to cause significant damage to businesses
  • These failures include:
    ⚬ Weak security hygiene
    ⚬ Insufficient Data Protection

  • Attack vectors continue to shift
  • Private key extraction is a real threat
  • Cyber criminals’ focus is now primarily data theft …
  • High-security environments need trusted storage …

As technology evolves, so do attack methods. more> http://tinyurl.com/p3ed3zt


Don’t Mess With Encryption

Bloomberg – Big technology companies, worried about hackers and government surveillance, are starting to encrypt their devices and services more aggressively, often by default.

Alarmed by this, U.S. intelligence officials want companies to be more helpful.

Providing special access for governments could weaken digital security for everyone else. As a group of top computer scientists recently warned, it would undermine enhancements that have made progress in warding off hackers, make systems far more complex and thus more vulnerable, and create enticing new targets for cybercriminals.

The result could be an increase in fraud, identity theft and other crimes.

A back door for cops can be opened by robbers, too. more> http://tinyurl.com/operepg

How to hack a city—and why we should

By Jonathan Keane – Over time, city systems often become a patchwork of old and new technology.

That presents two different types of problems. The new technology is often untested. And obsolete technology can bring its own vulnerabilities. …

Japan’s government has adopted a similar approach as it prepares for the 2020 Olympics by establishing a new cybersecurity strategy team.

The government has been holding cybersecurity drills across its departments to back up national security, and it intends to train up to 50,000 citizens, both private and public sector, and improve their computer skills by 2020 to raise information security standards and protect against exploits and attacks, including attacks on websites and Olympic event ticket sales systems. more> http://tinyurl.com/op2ruot