We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.

Blog: John Myers Subscribe to this blog's RSS feed!

John Myers

Hey all-

Welcome to my blog. The fine folks at the BeyeNETWORK™ have provided me with this forum to offer opinion and insight into the worlds of telcommunications (telecom) and business activity monitoring (BAM). But as with any blog, I am sure that we (yes we... since blogging is a "team sport"...) will explore other tangents that intersect the concepts of telecom and BAM.

In this world of "Crossfire" intellectual engagement (i.e. I yell louder therefore I win the argument), I will try to offer my opinion in a constructive manner. If I truly dislike a concept, I will do my best to offer an alternative as opposed to simply attempting to prove my point by disproving someone else's. I ask that people who post to this blog follow in my lead.

Let the games begin....

About the author >

John Myers, a senior analyst in the business intelligence (BI) practice at  Enterprise Management Associates (EMA). In this role, John delivers comprehensive coverage of the business intelligence and data warehouse industry with a focus on database management, data integration, data visualization, and process management solutions. Prior to joining EMA, John spent over ten years working with business analytics implementations associated with the telecommunications industry.

John may be contacted by email at JMyers@enterprisemanagement.com.

Editor's note: More telecom articles, resources, news and events are available in the BeyeNETWORK's Telecom Channel. Be sure to visit today!

A good friend of mine, Geoff Ibbett, has an interesting article regarding telecom fraud. It details many of the pitfalls associated with next generation networks.

This article is backed up by a recent study that shows that not only are mobile users using less secure networks, but that they are engaging in riskier behavior on those networks that can negatively impact not only their mobile devices but the corporate networks that they connect to.

Both of these show that telecom providers and IT departments need to be aware of what is going on with new mobile usage. On both sides, vendor and corporate client; the benefits associated with increased data ARPU and increased productivity due to the "de-coupling" from fixed locations need to be balanced with the appropriate level of risk assessment. Not to say that the risks should be avoided.... But rather those risks need to be measured and the appropriate mitigation strategies should be implemented.

Technorati Tags: Telecommunications, Telecom, Geoff Ibbett, Fraud, Next Generation, Trend Micro, Risk Assessment

Posted September 12, 2007 8:00 AM
Permalink | No Comments |

Leave a comment

Search this blog
Categories ›
Archives ›
Recent Entries ›