Why RAN is Screaming Hot in 2015

Posted on
RAN

2015 is bringing significant changes to the radio access network (RAN) environment as the insatiable demand for mobile data continues to accelerate. These pressures are forcing operators to rethink their business models and how they operate. CSPs are aware of the need to improve the Quality of Experience for subscribers while also continuing to invest […]

How Do You Measure “Quality of Experience” in a Mobile Environment?

Posted on
Measuring Quality of Experience

Mobile Network Operators (MNOs) have to adapt to a rapidly changing market. The explosion of smartphones(~1 Billion sold in 2014), the applications accessible through mobile networks and the advent of Over-the-Top (OTT) Services are clearly putting pressure on the traditional Service Providers to differentiate themselves, keep the customer base loyal and, most importantly, recover revenues that are currently flowing toward the OTT providers (or to other MNO competitors).

Top 5 Communications Trends of 2013

Posted on
Communication Trends

2013 has been a year of ginormous communications changes, from the mind-blowing growth of smartphone usage to the game-changing addition of WebRTC. Organizations have been increasingly focusing on improving customer service, recognizing that while voice is still king, customers need to know that they can reach companies in other ways too, like through social media or video chat or instant messaging. Big data has made it possible to begin anticipating issues and improving and personalizing communications.

Fraud Within a VoIP Environment

Posted on
Hacker

Since the introduction of VoIP, the service or underlying technology (based on the SIP protocol) has been susceptible to multiple fraud scenarios. In particular, by exploiting some of the features of VoIP, such as three way call and call transfer, hackers can inject call signals into the network and effectively hijack calls. The result is significant non-billable revenue for the Service Provider. Since commands associated with VoIP technology are often sent un-encrypted and without authorization for each command, this is an easy technique to carry out.