Incognito Blog

Your source for opinion and insight on network management trends and subscriber experience optimization.

Why Homegrown Subscriber ID Solutions Limit Problem Solving

Most service providers are aware that there needs to be a simple, fast way to identify subscribers. Unfortunately, in reality, mapping IP addresses back to subscribers for identification purposes —  such as lawful interception requests or acceptable use policy violations — can be complicated. It usually involves analyzing data sets, completing manual audits, or reliance on multi-step solutions. Continue Reading

Continue Reading
  • Share:

Support Plug-and-Play with On-Boot Firmware Updates

Have you ever purchased a new electronic device, taken it home, excitedly unwrapped it and switched it on, only to discover that something is wrong and you need to phone customer support?

This scenario is all-too-common in the broadband services industry, and unfortunately, it’s usually the service provider who takes the blame. New customers will often purchase gateways from third parties or redistributors without knowing that the device’s firmware is out of date. When the customer attempts to connect this device to their network, they’re quickly blocked by an error message (or sometimes no message at all) due to expired or unsupported firmware. Continue Reading

Continue Reading
  • Share:

High Availability and Disaster Recovery 101

In a practical example, centralized lease solutions are used by many OSS/BSS services to perform lease lookups. These can be used for legal, troubleshooting, and ultimately even billing. Being able to perform lease lookups is a critical component in the overall provisioning of services to a subscriber. But what would happen if services are unreachable? Continue Reading

Continue Reading
  • Share:

Are Lawful Intercept Requests Keeping You Up at Night?

It’s a familiar scenario that every service provider is likely to face: legal authorities request IP usage records and information about the subscribers associated with those IPs to fulfil lawful intercept or copyright infringement violations. Given the sensitive nature of these requests, it is vital that the information you provide is completely accurate. Can you make that guarantee? Continue Reading

Continue Reading
  • Share:

How a solid provisioning solution can protect against CPE fraud — and increase your bottom line

This blog was co-authored with Patrick Kinnerk, Senior Product Manager at Incognito.

Cable modem fraud can be a major source of revenue leakage for service providers. A recent study found that communication service providers lost $3 billion dollars worldwide due to cable modem cloning and fraudulent practices.

To combat this problem, device provisioning solutions include mechanisms to prevent loss — but what do you really need to protect your bottom line? Continue Reading

Continue Reading
  • Share: