No middle ground for BYOD

10 June 2013 by Steve Blum
, ,

There’s a variety of methods IT departments use to manage bring-your-own-device (BYOD) users. It ranges from limiting access to the internal network – no different, say, than accessing your business email from home – to putting managed apps on devices to installing a ring-fenced operating environment. SAP, for example, provides companies with a way of creating a sealed-off area on consumer-grade phones.

sliderule

Fully compliant BYOD.

Limiting access isn’t intrusive, but it greatly limits the company resources an employee can access with his or her phone.… More

Toys are serious fun

9 June 2013 by Steve Blum
, , , ,

Boys prefer helicopters?

What might be the most revolutionary technology poking its nose into the market right now is just a toy. NeuroSky makes a headset that controls devices by reading your brainwaves. Their first shot at a product was a tiara with cat ears that reacted to the wearer’s mood. A big hit with girls. A helicopter for the boys followed.

There’s a long and proud tradition of breakthrough technology getting its first consumer foothold in toy stores.… More

Telecoms privacy, or lack thereof, is a choice you've already made

8 June 2013 by Steve Blum
,

You’re gonna have to answer to the Coca-Cola company.

What we’ve seen over the past week might be news, but it’s not new. Telecoms and information service providers are in an ever tightening squeeze, as public and private interests use congressional influence to access customer information for their own ends.

It’s still not clear just how enthusiastically Google, Facebook, Verizon, AT&T and others have cooperated with federal spying efforts. So far, when companies have commented, it’s been along the lines of “we’re only doing what we’re required by law to do, and nothing more.”… More

Did anyone expect Big Government to ignore Big Data?

7 June 2013 by Steve Blum

When bits and wrangling were real.

Phone records, email, file transfers, social networks, VoIP, chat and, apparently, credit card transactions. All this data and more, from and to potentially anyone in the U.S., it is said, is passing through federal government filters in pursuit of foreign terrorists.

In one respect this week’s revelations, to whatever extent true, come as no surprise. The National Security Agency, or any other intelligence organisation, is naturally inclined to lust after any massive source of data, and big telecoms, information technology and financial companies are just that.… More

An invisible hand for wireless broadband

6 June 2013 by Steve Blum
, , , , ,

What we have here is a failure to communicate.

Shortages are often – some would say always – the result of a market failure. Supply and demand are functions of both the physical availability of a good or service and the price deemed acceptable by both parties in the transaction. If the balancing mechanisms don’t exist, suppliers are left with unsold inventory and buyers do without.

Wireless bandwidth is a classic example. Who hasn’t tried to connect a smart phone and found no mobile carrier signal and only locked down WiFi?… More

Cable lobby blocking competition from broadband subsidies in federal farm bill

5 June 2013 by Steve Blum
, , ,

Don’t you dare overbuild modern telecoms systems.

Federal broadband subsidies for rural areas are up for a vote in the U.S. Senate on Thursday, and cable lobbyists are pressing hard for restrictions on construction funding. Broadband is but one tiny piece of a huge, five year farm program that costs nearly a trillion dollars and includes everything from crop insurance to food stamps.

The bill has been stalled in the senate for some time. Given the rules there, it needs 60 out of 100 votes to move forward.… More

Android becomes the Windows of opportunity


It goes both ways. But maybe not much longer.

Microsoft continues to slide toward the back of the mass computing market pack. Three more signs it’s losing its grip on consumer-grade devices:

More

Last chance challenge to FCC pole attachment rules

3 June 2013 by Steve Blum
, , ,


Crowding in on a deal.

The U.S. Supreme Court might have the final say over whether incumbent telcos get the same pole attachment price breaks as cable and new telecoms companies. The base FCC-mandated rate is $7 per attachment per year, assuming it only takes up one foot of vertical space on a pole.

In 2011, the FCC extended that rate to all. It was originally thought to apply only to new entrants into the telecoms business, including cable companies.… More

Don't predict African broadband growth with consensus and conventional wisdom

2 June 2013 by Steve Blum
, , , ,

African traffic coming thicker and faster.

Cisco’s latest Visual Networking Index (VNI) shows global data traffic tripling over the next five years, growing to a level of 121,000 petabytes per month. North America and the Asia-Pacific region are the the big hitters, then and now, each accounting for roughly a third of total Internet traffic. Africa and the Middle East, on the other hand, barely registers. The report projects faster growth there, but even so that region’s share of global data movement will only go from about 2% of the total to 3%.… More

Internet video won't flourish in a walled garden

1 June 2013 by Steve Blum
, , , ,

Source: Cisco VNI 2012-2017

By 2017 Internet protocol video traffic will triple worldwide, according to Cisco’s latest Visual Networking Index (VNI). It’s an annual estimate of how Internet and Internet protocol traffic will grow over the coming five years.

IP video traffic totalled 24,000 petabytes a month during 2012 and is projected to grow to 76,000 petabytes a month in 2017.

The share of Internet protocol video delivered inside a walled garden will gradually decline, although like everything else it will continue to increase in absolute terms.… More