Financial services adopt comprehensive network security strategy for breach detection and remediation post-event. Being a senior network engineer charged with ensuring secure financial services to tens of thousands of customers can be a lot of pressure. However, a more robust security strategy including close alignment with security teams can help keep everything running smoothly. The […]

Unless you’ve been living under a rock for the past year, you’ve likely been unable to get away from chatter about the 10th anniversary of the iPhone this month. There’s also plenty of speculation about the revolutionary new features of that milestone device. Here’s a bold prediction: the final announcement is going to be anticlimactic. […]

Migrating to G.fast is the most economical way to bring Gigabit speeds to customers because the existing copper or coax infrastructure is reused between the DPU to the customer’s client. This avoids rewiring for the last 250 to 300 meters. All segments of the hybrid network: fiber, copper line, interior twisted pair or coax wiring, […]

  The technology in a radio tower is undergoing dramatic change, which is presenting tough real-world challenges for the crews that carry out the installation work. Riggers, or tower climbers as they’re better known in the US, are finding that as networks become more complex, their role is becoming increasingly difficult. As technicians, riggers perform […]

Centralized Radio Access Network (C-RAN) deployment is a growing trend in the wireless industry. I am often asked what is driving this trend, why some operators are using it more than others, and what are some of the challenges and benefits of C-RAN. In this blog, I will try to capture some of those questions […]

New Observer Apex offers faster loading speeds, connection dynamics functionality for packet visibility, on-demand application dependency mapping (ADM), improved widget editor for faster insights, VoIP service-level agreement assurance based on threshold monitoring, faster alarms, and more. On-Demand ADM On-demand ADM offers fast discovery of application interdependencies, building maps that visualize these complex relationships with simple […]

Security Forensics

Another day, another cyberattack. Just as companies were recovering after the WannaCry attack, a number of organizations were hit by Petya… or NotPetya. Name it as you see fit. In a matter of just two months, two devastating ransomware attacks have crippled networks globally. Clearly, security threats are multiplying in intensity and complexity. But what […]

Close