Our Latest Posts

What are the C-RAN challenges?


Publié par Frederic - 12 November 2015

Mobile operators heavily rely on low-energy, flexible traffic management and reliable architecture*. A Cloud-RAN (C-RAN) has the advantage of centralizing task-processing intelligence for multiple radio stations in one single node. This main node may then process cells interference which is the number one issue for operators and users in the quest for quality of service…

Telecoms stock values: danger ahead!


Publié par Frederic - 7 October 2015

An IHS Technology study forecasts a 23.3 billion dollars peak for 4G-LTE mobile equipment global investments in 2015. It will then decline on the beginning of 2016. These investments thus no longer offset the decrease in older generations’ 2G and 3G networks investments, because everyone awaits the 5G technology. In this context, how could Numericable-SFR’s…

Security breaches: a deadly hazard!


Publié par Frederic - 7 October 2015

Various security exploits have been reported by recent news: – In governmental areas: the US Office of Personal Management revealed on July 2015 that 21.5 million American official’s accounts, both inside and outside the government, were hacked, leaking sensitive personal data including their social security numbers and the content of their security clearance request file…

Ciphering is not the ultimate response….


Publié par Frederic - 7 September 2015

Cryptology and encryption are among trending topics these days, refreshing some knowledge about the subject might hence be useful, to be aware of the risks for instance, related to the encryption of your connected objects, brought by technical advances in the field of quantum computers and their computing power. Cryptography, the art of defensive ciphering…

Who will be the 5G-network’s outsider?


Publié par Frederic - 26 August 2015

Will Nokia’s acquisition of Alcatel give birth, by knock-on effect, to a new wireless networks actor? After this merger and acquisition, which major actors will remain in the wireless telecoms field? Chinese companies Huawei and ZTE, Ericsson and Nokia Corporation (Nokia + Alcatel)! It’s quite obvious that Huawei or ZTE are not necessarily welcome in…

A short movie is worth a lengthy speech…


Publié par Frederic - 4 August 2015

More and more often, examples of people who are victim of identity theft or their personal data being fraudulently used, as a result of unfortunate information publishing on media such as Facebook, LinkedIn, Viadeo, Twitter, etc. are presented in colloquia. We do not always consider experts’ recommendation, usually considering “it only happens to others”… A…

We previously discussed mobile telephone companies’ struggle to monetize voice traffic against VoIP operators (Skype, Viber, etc.) and rely on their experience to serve VoLTE, by delivering high definition voice signals through mobile battery saving delivery mechanisms. At the same time, the Internet of things raises another question, the network convergence one. The deployment cost…

VoLTE’s quality of service: Choosing a bearer


Publié par Frederic - 20 July 2015

In a previous post, voice over LTE’s deployment by mobile operators to compete with voice over IP has been discussed. That post covered some precautionary steps to follow for an “unrisky” deployment process. A couple of ideas are to add and might be useful to consider while performing an optimized deployment. The 3GPP (3rd Generation…

Insuring does not relieve from protecting


Publié par Frederic - 6 July 2015

A survey based on a panel of risk-managers by Allianz in January 2015 revealed that, fortunately, cyber risk was one of their five major concerns. In the light of this very kind of studies, twenty of major international insurance companies started, a few years ago, to focus on insuring against cyber risk, after covering for…

Mobile Apps and Privacy


Publié par Frederic - 22 June 2015

Which CIO or CISO has not been, at least once, confronted to the pressuring desire of a VIP or a group of young contributors to use their personal apps in the workplace or on their professional mobility tools? During  CyberSecurity International Forum  (FIC 2015) held in Lille last January, Pradeo Security Systems’ founding president Clément…