Pipeline Publishing, Volume 6, Issue 3
This Month's Issue:
On the Lookout: Network Monitoring
download article in pdf format
last page next page
NewsWatch
back to cover

article page | 1 | 2 | 3 |

in an accurate way. The solution allows CSPs to track usage patterns of their customers, type of device used, frequently used services, and other data points. By using said information, CSPs will be more able to offer value added services to their customers and opening themselves up to a far greater number of potential revenue sources. “A mobile phone number is one of the most powerful forms of identity that people possess,” said Richard Jacowleff, President, Interconnection Solutions, Telcordia.  “Accurately detailing a subscriber’s mobile phone number is a powerful foundation to establishing a complete subscriber profile. CSPs and content providers can use Telcordia Mobile ID to develop and deliver behaviorally based services, such as mobile advertising, location-based applications and promotions, and service upgrades.” He added, “Mobile ID can add between three and four percent to a CSP’s or message aggregator’s annual bottom line by eliminating routing-oriented revenue leakage.” The product is another indicator of the importance of eliminating customer churn by increasing satisfaction, while upping the profits for providers in this particular time of economic need.

Are service providers going to need to take major steps to protect all of their customers from malicious spying?


to date, customers (and providers) have been more concerned about download speeds, but these days, things have changed and customers are looking to upload more of their own content. This may be the signal to other communications service providers that they’re going to need to step up their data speeds with haste, because technology isn’t going to wait, and neither are the customers.

According to a company called Cellcrypt, a mobile phone encryption service, mobile phone calls are about to have their security compromised unless the issue is taken more seriously. Ian Meakin of Cellcrypt told Pipeline that they are seeing voice hacking “more and more frequently, but by its very nature, this is an activity that can go undetected more often than not. What was most surprising about the revelations in the UK’s Guardian newspaper [referring to a story about illegal phone tapping

.

Qwest is upping the ante on high-speed data services with its introduction of downstream connection speeds of 40 Mbps and upstream speeds of 20 Mbps as part of some subscription plans. These speeds, just about double from what they were on the downstream side, are some of the fastest available in the US. Packages for the new, faster speeds start from $99.99 (for the first 12 months) for 40 Mbps downstream and 5 Mbps upstream, with 40 Mbps downstream and 20 Mbps upstream starting at $109.99 a month (again, for the first 12 months.) The faster speeds are made possible by Qwest’s use of VDSL2 broadband technology and is an expansion of the RBOC’s fiber-to-the-node (FTTN) deployment. The new speeds are currently being rolled out to qualifying customers in Denver, Salt Lake City, Minneapolis/St. Paul, and Tucson regions. Up

.

of celebrities, which came out July 9, 2009] is not that mobile hacking happened at all, but the scale of it with between one and three thousand important citizens and officials apparently targeted.” So is this something that the general populace need concern themselves with? And are service providers going to need to take major steps to protect all of their customers from malicious spying? Meakin doesn’t think so. He said, “Typically, attacks are carried out by paid professionals with a specific malicious purpose in mind, so the majority of the public will not be affected and will generally be safe from casual unsophisticated and untargeted attacks.  However, with targeted attacks, it is not just celebrities who are at risk: it is also corporations, enterprises, and public officials.” If this is the case, service providers

article page | 1 | 2 | 3 |
last page back to top of page next page
 

© 2009, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.