SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Research Center

Search results for:
Brochure
Pipeline Marketing Planner Worksheet

Media planning worksheet for Pipeline marketing and advertising opportunities.... More Info


More Info Download Contact Author Share

Video
Executive Interview with DE-CIX on Interconnection

Pipeline had the opportunity to meet with Ed D’Agostino, Vice President of DE-CIX North America, to discuss low-latency, SLA-backed interconnect fabric at INCOMPAS Event 2018.... More Info


More Info View Contact Author Share

Video
Executive Interview with CHR Solutions on Digital Transformation

Pipeline had the opportunity to meet with Gary Knee, Head of Software of CHR Solutions, to discuss transformation of legacy systems into single, carrier-grade platforms, at INCOMPAS Event 2018.... More Info


More Info View Contact Author Share

Video
Executive Interview with iMiller/NEDAS on Communication Transformation

Pipeline had the opportunity to meet with Ilissa Miller, President & CEO of iMiller PR and NEDAS, to discuss transformation to new communication channels, at INCOMPAS Event 2018.... More Info


More Info View Contact Author Share

Video
Executive Interview with ZenFi Networks on New Fiber Networks

Pipeline had the opportunity to meet with Victoria Lamberth, Chief Revenue Officer of ZenFi Networks, to discuss its acquisition of CrossRiver Fiber and its new fiber network called network of neighborhood networks, at INCOMPAS Event 2018.... More Info


More Info View Contact Author Share

Video
Executive Interview with Bluebird Network on Network Connectivity

Pipeline had the opportunity to meet with James D. Taylor, Director of Carrier Services of Bluebird Network, to discuss broadband connectivity for rural communities to grow and thrive, at INCOMPAS Event 2018.... More Info


More Info View Contact Author Share

Video
Pipeline Event Exclusive: WeDo User Group (WUG NA) - AI for Fraud Management

Pipeline had the opportunity to meet with Pedro Fidalgo, Delivery Director North America of WeDo Technologies, to discuss artificial intelligence (AI) for fraud management at their User Group (WUG NA) Americas 2018.... More Info


More Info View Contact Author Share

Article
What We Need to Do in the Fight against IoT Fraud and Identity Theft

Within just two years, it is expected that there will be four connected ‘things’ for every person on the planet. The growth of the Internet of Things (IoT) means more convenience and opportunity for more people, but it comes at a cost.... More Info


More Info Download Contact Author Share

Article
How Operators can Avoid Blockchain's Pitfalls

The telecoms industry—perhaps more than any other—is in the midst of a seismic disruption, the likes of which have never been seen before. The rise in OTT service providers has eroded operators’ traditional voice and messaging revenues, while an increasingly virtualized ecosystem and the imminent arrival of 5G and the IoT all present operators with as many potential challenges as lucrative opportunities.... More Info


More Info Download Contact Author Share

Article
Cyberthreats that operators' customers will be facing during the holidays

As consumers forsake the mall in favor of Internet shopping, retailers are becoming increasingly reliant on their telecom providers to maintain their growing online footprint. But as the shopping season approaches, online retailing’s growth is threatened by a seasonal tsunami of cybercrime.... More Info


More Info Download Contact Author Share

Article
Advanced Analytics to Combat Robocalling

The Federal Trade Commission (FTC) received 4.5 million robocall complaints in 2017, up from 3.4 million the prior year. This significant increase helps to explain why the robocall epidemic is squarely in the crosshairs of wireless and wireline operators, regulators and legislators, technology vendors, and, of course, consumers.... More Info


More Info Download Contact Author Share

Article
Data Breach Emulation Raises the Bar

Your network is under siege. Both the nature of the Internet and hackers’ use of automated tools mean that attacks occur around the clock.... More Info


More Info Download Contact Author Share

Article
How to Attack-Proof Backup Data Against Ransomware

The most widely used approach used by businesses to recover from ransomware attacks has been to recover the criminally encrypted data from the backup set. This has provided a very successful workaround to paying the demanded ransom.... More Info


More Info Download Contact Author Share

Article
Proactive Network Issue Resolution is the Key to a Great Customer Experience

The telecommunications landscape is becoming increasingly competitive, forcing CSPs to find ways of improving their market position. Originating mainly from the IT world, OTT players are the main opponents, with light, easy-to-use mobile applications from companies such as Facebook, Uber and Spotify forcing customers to interact constantly with the service provider.... More Info


More Info Download Contact Author Share

Article
Going Underground for Data Center Assurance and Security

We exist in a world today that has witnessed more transformation in the last decade than over this past century. Knowledgeable systems digitally driven by powerful and innovative platforms and next-gen technologies like distributed cloud, Artificial Intelligence (AI) and the all-encompassing Internet of Things (IoT) make up only a partial list.... More Info


More Info Download Contact Author Share

Article
IoT Security: Down to Fundamental and Up to C-Level

Cybersecurity has become a major factor in the risk calculation of almost any company, no matter if it is a large enterprise or small home business. Various solutions are offered by many vendors to overcome the security gaps in companies’ networks and devices, and a lot of effort is invested in searching for the “holy grail” of security, the one that will supply a fully protected environment for all devices.... More Info


More Info Download Contact Author Share

Article
Letter from the Editor - November 2018

There is a war being waged and you are at the center of it. There is an army of bad actors armed with billions of connected devices executing precise operations with sophisticated weapons aimed at you, your loved ones, your company, and even your country.... More Info


More Info Download Contact Author Share

Article
Telecom Industry News - November 2018

October brimmed with fascinating news and developments. Network evolution in the skies will provide gate-to-gate connectivity for portions of the Air France fleet, thanks to a new partnership between Global Eagle and Orange Business Services.... More Info


More Info Download Contact Author Share

Video
MWC Event Exclusive with Radisys on Edge Computing

Pipeline had the opportunity to meet with Neeraj Patel from Radisys to discuss Edge computing at Mobile World Congress Americas.... More Info


More Info View Contact Author Share

Video
Executive Interview with ZenFi on 5G Wireless

Pipeline had the opportunity to meet with Ray LaChance from ZenFi Networks to discuss small cell densification for 5G wireless networks at Mobile World Congress Americas.... More Info


More Info View Contact Author Share

Video
Executive Interview with Flex on Innovation

Pipeline had the opportunity to meet with Chris Winslow from Flex to discuss next generation, digital innovation in Telecom at Mobile World Congress Americas.... More Info


More Info View Contact Author Share

Video
Executive Interview with AT&T on IoT

Pipeline had the opportunity to meet with Mobeen Khan from AT&T to discuss the evolution of IoT Services at Mobile World Congress Americas.... More Info


More Info View Contact Author Share

Article
Orchestration Imperative for 5G Slicing

Talk about 5G tends to center on the upsides—the new horizons, potential, and use cases that this next-generation network will make possible. While full of promise, that dialogue skirts the cold reality that 5G deployment will be very expensive.... More Info


More Info Download Contact Author Share

Article
MEF 3.0 - A Roadmap for Enabling Assured Services over Automated Networks

Throughout the past year, MEF has noted the growing recognition that service providers must move quickly to address changing customer requirements and adapt to intensifying competitive threats in the era of digital transformation. Executives from MEF member service providers have emphasized that it is imperative that they transform to deliver more dynamic, cloud-like services over automated and interconnected networks.... More Info


More Info Download Contact Author Share

Article
Connected Cloud Communications

In today’s digital era, businesses are exploring ways to use cloud capabilities to enable mobility, flexibility, and less expensive alternatives to traditional telecommunications, both for their internal communications as well as connecting with customers, partners and suppliers around the world. As with other areas that have benefited from the cloud, the move is designed to drive efficiencies, reduce costs and tap into new geographic markets and customer opportunities.... More Info


More Info Download Contact Author Share

Article
Being a Digital Service Provider

The questions for Communications Service Providers (CSPs) and Data Center Operators is: “what are their enterprise customers going to want next?” And, it’s a crucial question to ask, even if they themselves don’t know the answer yet. At a high level, we know enterprise customers generally want operational efficiencies, lower costs, and greater agility to consume, deploy, performance-tune, and manage IT resources.What if you could have it all?... More Info


More Info Download Contact Author Share

Article
The Broadband Service Providers Imperative

Broadband providers—especially those with legacy copper networks and cable networks—are overwhelmed by the pace at which revenue is dissipating. Over the top (OTT) service offerings have hit full force, attacking every fundamental service that exists except for the “pipe” to the consumer’s premises.... More Info


More Info Download Contact Author Share

Article
Edging Closer to Open Telecom Networks with Open RAN

The telecom industry is undergoing a significant transition as service providers and infrastructure vendors are turning to open source and multi-access edge computing (MEC) solutions to meet the demands of 5G—and to reduce costs and accelerate service innovation. Open RAN solutions are gaining traction with service providers that are driving disruption in their networks.... More Info


More Info Download Contact Author Share

Article
5G Transport: Let's Keep Things Flowing

By as soon as 2019, 5G will be here, according to Forbes. As more than just the next generation of mobile broadband, the technology is expected to completely transform all aspects of daily life—from connected cars to remote surgery, the possibilities for new and innovative services seem endless.... More Info


More Info Download Contact Author Share

Article
For My Next Data Center Location, I'll Take Manhattan

The Data Center Exodus From Manhattan Over the course of the last 11 years, there has been a data center exodus from Manhattan for a variety of reasons. Many events took place over this time period to make data center tenants nervous about locating their data centers in the heart of New York City.... More Info


More Info Download Contact Author Share

Search
search tips

Terms you want to exclude
(-) (minus)
Attaching a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results. The minus sign should appear immediately before the word and should be preceded with a space.

Terms you want to include
(+) (plus)
Indicates that a term is REQUIRED to be present in each returned row.

* (asterisk) The asterisk is a wildcard operator - it must be appended to a word, instead of preceding it, and will match any term which begins with that sequence of characters.

Media Type
Upload Assets

Add Your Assets to the Research Center

Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.

UPLOAD CONTENT

Welcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.

To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.