Skip to main content

Enterprise technology's juxtaposition, complementarity and application

The ability to see within an enterprise with operations requiring various technologies in information, communication, operational, security and compliance, or two or more of these, finds stakeholders, or the need to adjust techniques and make, some ingenious ways to be more effective in their responsibilities and deliverables or production. Enterprise technology is not an area and language to be used where there are only some specializations involved but which still within the confines of information technology. IT may have been serving utility operations or energy generation for sometime already and yet stakeholders cannot see how to work hand-in-hand to increase their own efficiency, and the output for which customers are very dependent. There are efforts but they remain completely separate and the result is the bigger realizations and concerns about costs rather than creation of value from the start, not just when profits began to come in. If IT is not clearly use in such environmen

Truth on international broadband internet, "subscribers' bandwidth" and transit

There are differences in our understanding of internet connection. Depending on who is talking or conveying it.

Even internet service providers (ISP) and telecommunications people may miss the crux of the internet simply because they intentionally do it or not aware at all. They are focused on making a sell. So is in general, it applies, to technology vendors.

Broadband is seen as high-speed internet connection which uses physical and wireless mediums. These are copper, fiber cable and wireless, 4G/5G (mobile and dedicated devices available) and satellite.

It may matter which medium is subscribed to but not really as it will, at the end, be dependent on the bandwidth and “speed” being provided for us by our telco. That’s one truth, can easily be digested for and by our regular, non-tech savvy subscribers or end-users. When we talk to telco sales and customer service people, we don’t hear from them this. What they tell us is the bandwidth and never mention, not a bit, about the minimum speed that everyone may get when their network is busy. Meaning there are considered peak hours in any location every single day or during some seasons that network performance, regardless of the connection medium and subscribed bandwidth, may slowdown. 

We may have accustomed ourselves of the speed test result showing how our connection is performing. The question is, our connection is already on turtle motion, and yet when we use those tools, it is still on high speed. Another measure is some applications we use for work is lagging while Youtube didn’t even budge. That’s on our telco and content providers and if any agreement has been inked due to that particular access.   

Our subscribed bandwidth is not all. Our local telco are also internet subscribers themselves else they would not be able to get our access to get through our favorite internet or digital services i.e. email, messaging etcetera.

Our biggest local telco have to enable their internet transit through one or more tier-1 networks. There are only a few dozen worldwide. They could be getting from any international or regional players, but they could also make a mixture of those, trying to assure local subscriber that they can never be cutoff in the internet. For multinational companies, this is a very important consideration in their internet subscription. Depending on available facility from the tier-1 network, a telco may subscribe up to 100 gigabit per second per port or circuit with a minimum, say 10Gbps. The small telco may only get the megabit offering.  

An overall transit, from local telco can be used to measure how they are doing. It could also be a reason for slowdown especially when everyone of their subscriber is busy. 

How do we read our speed test result and associate the telco transit facility in our own subscribed internet bandwidth?

When we use speed test tool, such server or tool is usually within the same local telco or local peer (usually other local telco) network. That will say, no matter how our connection crawls, especially when a service is being served or located in the other part of world, our speed test result with not correlate to the reality of the traffic we make to that part of the world.  

We may be promised a 500Mbps bandwidth but given the international transit facilities, that may seem impractical to a local telco. Both in technology and commercial contexts.

The industry and regulators can do better by softening the hype in marketing and get serious to customer protection.

Curious if there is even a better choice? Leased line. The bandwidth subscribed is the same and it is dedicated to the traffic created within and itself. It's also easier to monitor if the subscribed bandwidth is real.


Additional information



Comments

Popular posts from this blog

Philippine telcos blocking entire SMS text with internet addresses in it

If you are sending SMS texts to your friends, family or colleagues and they contain internet or web address including IP and email addresses, and even a period or dot separating, regardless of, your words and numbers, they are automatically blocked and not going to be received by your waiting recipient. Cooler heads must prevail here especially if an important message is urgently being expected. IP version 6 address is fine. However, an IPv4 including localhost address (given automatically to every computers and network interfaces as their own alone designed for troubleshooting purposes), and your money in the billion figure using dot as separators would be blocked.  If you send "local.business, naman.naman etcetera" or any words that made you use dot in between them, as part of the text, they will be blocked. There are some, that isn't blocked in this category. Like check.iclassed, some.ent, whatever.local etcetera, that is because they do not form any domain name at all

Philippine cyber campaign

Are Philippine institutions being targeted or simply being probed? We don't know for certain. It could be either or both. Whichever comes first? What we can understand, with the success of such attacks, is that they have found their way. Really.   How hard or easy? The attacker knows, but probably, also, those being attacked. Inclination should be there no matter how sophisticated our security systems are. In cybersecurity, we do a very focused job. Making sure we disappoint whoever is trying to gain access to any resource without permission and authority regardless of the environment we are in. What happened is that every asset deemed to have every variant of resource built-in, operating, that makes up the entire system working whatever it is trying to employ, in that case the primary purpose. Meaning, we have to know if we are running our system in a manner that is really secure, provisioned properly during design stage and managed continuously afterwards, post-implementation. No

iclassed privacy policy, unbelievable at first sight

Those who, before engaging us and was reading our business conduct, alerts and notices , could not restrain themselves asking, "can you really do your job without keeping any data at all? At the end of the day, you should still be looking at those information and make sure you did, and will, do well. I am expecting a lot from you here, you said so yourself!" Now, that last sentence is so loud. We keep them, not in our premises, but yours. If you've been our clients, you'll know how persistent we are when it comes to the reliability and security of your systems, data and credentials. That's our responsibility, as is made popular by cloud computing, and we don't need to be in a cloud.