Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
Agile and development and operations methodologies have made sweeping cultural changes in enterprise IT. Many of these changes have had...
A closer look at each of the phases of the site development process can help to identify where collaboration may make sense, and where in other cases it may lead to relinquishing a key strategic differentiator.
The class-action included more than 64,000 engineers, which, according to my excellent skills at long division, means that each engineer will be able to retire with a hefty $5,000 each.
For telecommunication companies, effectively managing customer relationships and delivering a critical service depends on understanding where customers are located in relation to the network they depend on.
Neutrality sounds good because it conveys the idea of “fair-play,” and we all like that. But neutrality doesn’t work in any other sphere of commerce or technology – so why would it work for the Internet?
The industry is abuzz with the promise that voice over LTE can bring. Carriers are seeing it as an effective means to gain spectrum efficiency and reduce the cost of service delivery.
Why don’t consumers wholeheartedly embrace the ease and convenience of mobile payments? Quite simply, they are worried about the security risk. That’s understandable, given that trust in the security of personal
An SMS service has the power to greatly improve your app purchase income and in-app buying revenue. There are dozens of ways that bulk SMS can benefit the sales of an app, with thousands of app developers
Cyber-attacks continue to become more innovative and sophisticated. Unfortunately, while organizations are developing new security mechanisms, cyber-criminals are cultivating new techniques to circumvent them.
The PSTN-to-IP transition will include widespread innovation and expanded carrier capabilities in dynamic, creative ways, but for this to happen most effectively, the FCC must stick to its core principles to ensure consumers come out ahead in the process.
Unfortunately, for those of us not so gifted, PowerPoint’s remain a struggle to insert interesting information into a digital format that sucks the interest out of just about any non-animation information.
Security is becoming a central focus for mobile services as personal smart devices occupy an increasing position in storing personal and professional data.
Editor’s Note: Welcome to our weekly Reality Check column where C-level executives and advisory firms from across the mobile industry share unique insights and experiences.
A few months ago, on the Discovery Channel, we saw the premier of “Hang Men,” chronicling the perils of tower...
The task facing CSPs is monumental – one of the biggest challenges to CSPs in the last 50 years. Customers are increasingly cutting the cord – literally – eroding the “cash cows” of voice and long distance services.
Many service providers come to a point where they could benefit from a rethink and refresh of their IP core network. So why exactly should service providers consider rethinking their IP core network architecture
If you want to understand the future of wearable technology, and the implications for corporate IT, don’t hang around Google Glass developer conferences.
Historically, the wireless infrastructure value chain consisting of tower operators, fiber backhaul providers and neutral colocation facility providers has existed as three distinct provider groups.
Speaking of handsets, we have updated our semi-annual look at smartphone models by carrier. There are many surprises and changes since we last analyzed the marketplace last October.
Apple next week is scheduled to hold its annual developers conference where the computing giant is expected to rollout enhancements to its software line up, including its mobile-focused iOS software.