Financial services adopt comprehensive network security strategy for breach detection and remediation post-event. Being a senior network engineer charged with ensuring secure financial services to tens of thousands of customers can be a lot of pressure. However, a more robust security strategy including close alignment with security teams can help keep everything running smoothly. The […]

Migrating to G.fast is the most economical way to bring Gigabit speeds to customers because the existing copper or coax infrastructure is reused between the DPU to the customer’s client. This avoids rewiring for the last 250 to 300 meters. All segments of the hybrid network: fiber, copper line, interior twisted pair or coax wiring, […]

  The technology in a radio tower is undergoing dramatic change, which is presenting tough real-world challenges for the crews that carry out the installation work. Riggers, or tower climbers as they’re better known in the US, are finding that as networks become more complex, their role is becoming increasingly difficult. As technicians, riggers perform […]

Migrating to DOCSIS 3.1 doesn’t have to be complicated. With these five points, you can become an expert in no time! OFDM building blocks are the key to optimal performance, reliability, and quality of experience for the customer: • Test the OFDM signal quality, including levels and level variation, MER, and ingress/noise under the carrier. […]

Centralized Radio Access Network (C-RAN) deployment is a growing trend in the wireless industry. I am often asked what is driving this trend, why some operators are using it more than others, and what are some of the challenges and benefits of C-RAN. In this blog, I will try to capture some of those questions […]

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of application interdependencies, building maps that visualize these complex relationships with simple […]

Security Forensics

Another day, another cyberattack. Just as companies were recovering after the WannaCry attack, a number of organizations were hit by Petya… or NotPetya. Name it as you see fit. In a matter of just two months, two devastating ransomware attacks have crippled networks globally. Clearly, security threats are multiplying in intensity and complexity. But what […]

Close