Latest Blog Posts

Newsletter

For a Free Quote...

Telnet Network News

Telnet Network News - We'll keep you up to date with what's happening in the industry.

BCE revenue increased 2.9% in Q3

Bell Canada Enterprises (BCE) has posted total operating revenue of CAD5.345 billion (USD4.061 billion) in Q3 2015, up by 2.9% year-on-year, while quarterly adjusted EBITDA was up 3.4% to CAD2.187 billion on positive growth across all Bell operating segments, reflecting y-o-y increases of 8.3% at Bell Wireless, 1.1% at Bell Wireline and 0.5% at Bell Media. Q3 net customer additions reached 68,000 in IPTV, 58,000 in fixed broadband and 77,655 post-paid mobile customers, while Bell also reported n...
Continue reading
  1276 Hits
  0 Comments
1276 Hits
0 Comments

Seven Reasons To Analyze Network Traffic With NetFlow

NetFlow allows you to keep an eye on traffic and transactions that occur on your network. NetFlow can detect unusual traffic, a request for a malicious destination or a download of a larger file. NetFlow analysis helps you see what users are doing, gives you an idea of how your bandwidth is used and can help you improve your network besides protecting you from a number of attacks. There are many reasons to analyze network traffic with NetFlow, including making your system more efficient as well ...
Continue reading
  1301 Hits
  0 Comments
1301 Hits
0 Comments

What is Driving Demand for Deeper Traffic Analysis?

During a customer review call last week, we got a very interesting quote from a US based user who offers marketing services to the retail sector: ‘We need greater insight over what is taking place on our internal network, systems, services, and external web farm seen through a single portal. We need to keep downtime to a minimum both internally and on our external customer-facing web farm. We chose LANGuardian because of its integration with SolarWinds and its deep-packet inspection capabilities...
Continue reading
  1843 Hits
  0 Comments
1843 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
  1472 Hits
  0 Comments
1472 Hits
0 Comments

Customization Nation with Sapling Digital Clocks

No matter the product, everyone has different tastes and styles they prefer. Because of this, people really enjoy the ability to customize the items they purchase to meet these preferences. Giving customers the option to personalize their product or service has benefited many different companies in many different industries. Let’s take the shoe industry as an example. Nike has been wildly successful with the Nikeid option on their website. This option gives their patron the option to customize a...
Continue reading
  1316 Hits
  0 Comments
1316 Hits
0 Comments

The Network Design and Equipment Deployment Lifecycle

As we all know, technology has a life cycle of birth, early adoption, mainstream, and then obsoletion. Even the average consumer is very in touch with this lifecycle. However, within this overarching lifecycle there are “mini” lifecycles. One of these mini lifecycles that is particularly important to enterprises is the network design and equipment deployment lifecycle. This lifecycle is the basic roadmap of how equipment gets deployed within a company data network and key a topic of concern for ...
Continue reading
  1948 Hits
  0 Comments
1948 Hits
0 Comments

How to Deal With Unusual Traffic Detected Notifications

If you get an unusual traffic detected notification from Google, it usually means your IP address was or still is sending suspicious network traffic. Google can detect this and has recently implemented security measures to protect against DDoS , other server attacks and SEO rank manipulation . The key thing to remember is that the notification is based on your Internet facing IP address, not your private IP address which is assigned to your laptop\PC\device. If you don’t know what your Internet ...
Continue reading
  1209 Hits
  0 Comments
1209 Hits
0 Comments

Key Factors in NCCM and CMDB Integration - Part 2 – Change Configuration and Backup

In Part 1 of this series I discussed how an NCCM solution and a CMDB can work together to create a more effective IT inventory system. In this post, I will be taking that a step further and show how your change configuration process will benefit from integration with that same CMDB. In general, the process of implementing IT infrastructure change happens at 3 separate stages of an assets lifecycle. Initial deployment / provisioning In production / changes Decommissioning / removal In each of the...
Continue reading
  1161 Hits
  0 Comments
1161 Hits
0 Comments

Infosim® Announces Release of StableNet® 7.5

Infosim® , the technology leader in automated Service Fulfillment and Service Assurance solutions, today announced the release of version 7.5 of its award-winning software suite StableNet® for Telco and Enterprise customers. StableNet® 7.5 provides a significant number of powerful new features, including: Dynamic Rule Generation (DRG); a new and revolutionary Fault Management concept REST interface supporting the new StableNet® iPhone (and upcoming Android) app Highly customizable dashboard...
Continue reading
  1509 Hits
  0 Comments
1509 Hits
0 Comments

How Testing Solutions Reduce Risk & Improve Customer Satisfaction

Imagine you're trying to book a flight. You call the toll-free number and use the interactive voice response (IVR) to get through to bookings, but instead you are put through to the baggage area. You hang up and try again, but this time you wind up speaking to the airline lounge. Do you try a third time or call a competitor? I know what I would do. The IVR is now a key component to delivering a great customer experience, so what steps should a business take to ensure these systems are working op...
Continue reading
  3009 Hits
  0 Comments
3009 Hits
0 Comments

Infosim® Global Webinar Day October 29th, 2015 StableNet® 7.5 - What's New?

Join Harald Hoehn, Senior Developer and Consultant with Infosim®, for a Webinar and Live Demo on the latest information regarding StableNet® 7.5 This Webinar will provide insight into: StableNet® 7.5 New Features such as: New Web Portal [Live Demo] New Alarm Dashboard [Live Demo] New NCCM Structurer [Live Demo] DRG (Dynamic Rule Generation) as a new and revolutionary Fault Management concept StableNet® 7.5 Enhancements such as: Enhanced Weather Maps [Live Demo] Improved Trap- and Syslog-Forwardi...
Continue reading
  868 Hits
  0 Comments
868 Hits
0 Comments

How Can We Monitor Traffic Associated with Remote Sites?

Many IT teams are now tasked with managing remote sites without having the luxury of local IT support. Business owners expect everything to be done remotely, we do live in the connected age, don’t we? Is it possible to see what is happening in these networks without the need for installing client or agent software everywhere? You can gather some network performance information using SNMP or WMI but you will be limited to alerts or high level information. What you need is some form of deeper traf...
Continue reading
  1274 Hits
  0 Comments
1274 Hits
0 Comments

Two Ways Networks Are Transformed By NetFlow

According an article in techtarget.com "Your routers and switches can yield a mother lode of information about your network--if you know where to dig." The article goes on to say that excavating and searching through endless traffic data and logs manufactured by your network system is a lot like mining for gold, and punching random holes to look for a few nuggets of information isn't very efficient. Your search will be much more fruitful if you know where to look and what it will look like. Fort...
Continue reading
  1113 Hits
  0 Comments
1113 Hits
0 Comments

Webinar- Best Practices for NCCM

Most networks today have a “traditional” IT monitoring solution in place which provides alarming for devices, servers and applications. But as the network evolves, so does the complexity and security risks and it now makes sense to formalize the process, procedures, and policies that govern access and changes to these devices. Vulnerability and lifecycle management also plays an important role in maintaining the security and integrity of network infrastructure. Network Configuration and Change M...
Continue reading
  1191 Hits
  0 Comments
1191 Hits
0 Comments

SDN/NFV – From Theory to Praxis with Infosim® StableNet®

InterComms talks to Marius Heuler, CTO Infosim®, about Infosim® StableNet® and the management and orchestration of SDN and NFV environments Marius Heuler has more than 15 years of experience in network management and optimization. As CTO and founding member of Infosim®, he is responsible for leading the Infosim® technical team in architecting, developing, and delivering StableNet®. He graduated from the University of Würzburg with a degree in Computer Science, holds several Cisco certifications,...
Continue reading
  1274 Hits
  0 Comments
1274 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
  1445 Hits
  0 Comments
1445 Hits
0 Comments

5 Reasons Why You Should Include LAN Switches in Your NCCM Scope

We’ve been doing a lot of blogging around here lately about NCCM and the importance of having an automated configuration and change management system. We’ve even published a Best practices guide for NCCM . One of the main points in any NCCM system is having consistent and accurate configuration backups of all of your “key” devices. When I ask Network Managers to name their key devices, they generally start with WAN / Internet routers and Firewalls. This makes sense of course because, in a modern...
Continue reading
  1056 Hits
  0 Comments
1056 Hits
0 Comments

5 Perks of Network Performance Management

Network performance management is something that virtually every business needs, but not something that every business is actively doing, or even aware of. And why should they? While understanding the technical side of things is best left to the IT department, understanding the benefits of a properly managed network is something that will help get the business managers on board, especially when good performance management solutions might be a cost that hadn't been considered. So what are the ben...
Continue reading
  1126 Hits
  0 Comments
1126 Hits
0 Comments

Remote Location Testing? Transmit WiFi Traffic at a Remote Site for 12 Hours with LANforge WiFIRE

CT523-328-2ac-1n-bat LANforge WiFIRE 802.11a/b/g/n/ac 3 radio WiFi Traffic Generator (with Battery) Supporting 328 Virtual STA Interfaces The CT523-328-2ac-1n-bat wireless traffic generator is an excellent choice for testing Access Points and other WiFi networks. The CT523-328-2ac-1n-bat uses a modified Wireless driver for WiFi NICs based on the Atheros chipset. The ath9k (a/b/g/n) chipset NICs can support up to 200 stations per radio. The ath10k (a/b/g/n/ac) chipset NICs can support up to 64 st...
Continue reading
  1414 Hits
  0 Comments
1414 Hits
0 Comments

The Benefits of Using 2-Wire Digital Master Clock System

If you are considering a wired clock system for your facility, the 2-wired Digital Master Clock System option with Sapling may be the best option for you. Take a look at the unique advantages of this system below. In addition to the written description, check out our video at the bottom to see a visual depiction of how the 2-Wire Digital Clock System works. Power/Data on the Same Line Most wired clock systems require three or four wires. With Sapling’s 2-Wire Digital Communication System, the co...
Continue reading
  1458 Hits
  0 Comments
1458 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
100 Strowger Blvd, Suite 118, Brockville, ON, K6V 5J9, Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts (copy)