Blog

Get news about our products, which events we are attending plus industry insights and commentary

Telecom

Improving Enterprise Network Operational Efficiency

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 14 July 2017. Posted in Telecom, Company News

Despite a recent trend towards organisations outsourcing network security to third party management companies, a recent study conducted by Forcepoint clearly shows that most enterprises actually prefer internally managed full network visibility, control and flexibility to make their own choices about changes. 

MWC 2017 Round Up: IoT Becoming a Reality

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Monday, 06 March 2017. Posted in Telecom, Events

Every year around 100,000 people descend on Barcelona to try and cut a deal or two at Mobile World Congress (MWC), arguably the biggest Telecoms show in the world, and 2017 did not disappoint. From the return of old favourites like the Nokia 3310 to the launch of plucky newcomers such as the LG 6G, MWC is a who’s who of the mobile industry, big and small and everyone in between.

What will an Interactive Voice Response System (IVR) look like in 2017?

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Wednesday, 30 November 2016. Posted in Telecom

An IVR is an automated phone system that can greet and direct callers based on the callers' identity, their responses and their service preferences. Employing people to sit around and answer phones all day can be a costly and inefficient for businesses of any size.

NFV Series: Network Function Virtualisation, maximising your potential

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Thursday, 27 August 2015. Posted in Telecom

The obvious advantages of an NFV network architecture are reduced capital expenditure (CAPEX) and operating expenditure (OPEX). Whereas the old paradigm required bespoke hardware devices for each network function – hardware devices that quickly became obsolete as average hardware capabilities surpassed them – NFV allows network functions to be virtualised and run on commercial off the shelf (COTS) servers.

NFV Series - Network Function Virtualisation (NFV), a disruption to the status quo

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing professional, creating content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 07 August 2015. Posted in Telecom

Stringent standards for protocol adherence and stability meant development of these hardware devices was slow but despite the time spent developing them the continual acceleration of hardware capabilities, as described by Moore’s law, meant they soon became obsolete. This resulted in operators continually having to repeat the cycle of design, integrate and deploy just to keep up with competitors. Not only is this expensive, it does little if anything to bring in additional revenue as customers come to expect the services offered by the new hardware platforms as standard.

Successful Implementation of the Telesoft OKEFORD 5500 Media Platform

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B cyber security specialist and Director. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Tuesday, 19 May 2015. Posted in Telecom, Company News

We recently completed a large migration project for one of our market leading legacy products the OKEFORD 2450 IVR, working with a Tier 1 Service Provider and one of the biggest System Integrators to migrate all of the revenue generating services provided by the OKEFORD 2450 IVR, to our latest iteration, the OKEFORD 5500 Media Platform.

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.