Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes — such as lawful interception requests or acceptable use policy violations — can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. Continue Reading
Have you ever purchased a new electronic device, taken it home, excitedly unwrapped it and switched it on, only to discover that something is wrong and you need to phone customer support?
This scenario is all-too-common in the broadband services industry, and unfortunately, it’s usually the service provider who takes the blame. New customers will often purchase gateways from third parties or redistributors without knowing that the device’s firmware is out of date. When the customer attempts to connect this device to their network, they’re quickly blocked by an error message (or sometimes no message at all) due to expired or unsupported firmware. Continue Reading
Firmware is often a tricky topic for service providers, but I’ve found there’s one major issue that keeps coming up with mid-to-large sized operators — and it doesn’t have an easy solution. How can you upgrade firmware on a device before it’s provisioned into the network?
In a practical example, centralized lease solutions are used by many OSS/BSS services to perform lease lookups. These can be used for legal, troubleshooting, and ultimately even billing. Being able to perform lease lookups is a critical component in the overall provisioning of services to a subscriber. But what would happen if services are unreachable? Continue Reading
It’s a familiar scenario that every service provider is likely to face: legal authorities request IP usage records and information about the subscribers associated with those IPs to fulfil lawful intercept or copyright infringement violations. Given the sensitive nature of these requests, it is vital that the information you provide is completely accurate. Can you make that guarantee? Continue Reading
As we approach the end of 2016, everyone starts to think about their new year’s resolutions and what they hope to achieve in 2017. While we all have some personal goals and resolutions, I believe that one of the top resolutions in the cable world is to become fraud free. Continue Reading
This blog was co-authored with Patrick Kinnerk, Senior Product Manager at Incognito.
Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices.
To combat this problem, device provisioning solutions include mechanisms to prevent loss — but what do you really need to protect your bottom line? Continue Reading
There are many ways that fraud can appear in your network. Our focus today will be on cable modem cloning and its affect on your bottom line, as well as the quality of service (QoS) impacts that fraud has on your legitimate end users.
Let’s start with the basics: what does cable modem cloning mean? Continue Reading
Last week I talked about the importance of fast-tracking DOCSIS firmware updates. But from a cost perspective, do you know how much are you spending annually on DOCSIS firmware management? For too many service providers, the answer is no. Continue Reading
In today’s high-speed IP services environment, network administrators often rely on manual steps to complete the complex business processes that ensure device and network health. One of the most tedious tasks for network administrators is managing and updating firmware across a wide network of end-user DOCSIS gateways.