Quality of Experience – How machine learning, net neutrality, and 5G relate to QoE

Around the world, an enormous amount of money is being spent on bandwidth and network equipment as communications service providers (CSPs) strive to deliver optimal Quality of Experience (QoE) across a range of existing and planned services. During 2018, in the US alone, communication service providers’ (CSP) broadband CAPEX rose more than $2.2B. Looking forward,…

Closed-Loop Automation: What it means for CSPs | Allot

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

Don’t be a Dumb Pipe! You CAN Analyze Encrypted Video Traffic

If you were to ask consumers in regulated countries what the main driver was for choosing their mobile service provider, chances are they’ll tell you that when it comes to data bundles and price, they’re all similar. So, what is most important to them?   Well here are a few hints. By 2021, 82% of…

Criminals Hacking CPUs to Mine Cryptocurrencies

  Cryptocurrency Hijacking Cryptocurrency hijacking, or “cryptojacking” is one of the major threats faced by Enterprise IT teams today, and probably the most underestimated. Cryptojacking involves the covert, illegal use of targeted computing resources to mine cryptocurrencies. Cryptocurrency mining requires massive processing power to solve complex algorithms as part of the blockchain validation mechanism. This…

“Anonymous” to Erase Israel from the Internet—Or Is It?

  Five years ago, a “hacktivist” group of cyber-disruptors united to attack the Internet infrastructure and websites of the State of Israel. The initial date of that attack was the 7th of April 2013, the eve of Israel’s annual Holocaust Memorial Day, and they have continued to target Israel every year on the anniversary of…

DPI: Enabling secure, personalized and metered services

Why Deep Packet Inspection may be the key to enabling secure, personalized and metered services, should the FCC decide to end net neutrality in the USA. And isn’t it ironic?* It’s like spamming the FCC with bot driven anti net neutrality comments. It’s like a DDoS attack keeping anyone from commenting on it OK maybe…

Are you caught in the Bitcoin “gold rush” but is someone else reaping the rewards?

Seems like everyone has been talking about Bitcoin lately. If you remember the dot com boom of the late nineties like I do, you might have a slight feeling of deja vu. But whether we are facing a bubble or not, one thing learned recently while doing some network data analysis, is that a new…

Net Neutrality – Dead as a Dodo

Net neutrality is about to go the way of the Dodo Bird. Regardless of whether you are pro-Trump or anti-Trump, pro-regulation or anti-regulation, this is a huge change in how we access the internet. Will service providers favor their own services, strike deals with content providers that effectively box out smaller competitors or create a…

BadRabbit: Is Three the Magic Number, or is this The New Normal?

Did you know that the damages from Ransomware are expected to be more than $5 billion by the year 2020? This is not just the cost of paying the ransom itself, but also the price of destruction and loss of data, the downtime involved getting systems back online, and the disruption to the business which…

Biting the Hand that Feeds You: When IoT-Based Attacks Strike Service Providers

While we’re arming ourselves, our businesses and organizations against IoT-based attacks, few people talk about the damage they do to service providers. It’s something that gets overlooked, but the potential for causing detrimental impact is considerable. Service providers can suffer particularly badly because: They can be a target Attacks can originate from within their own…