Zayo buying Allstream for USD347.6m

Canada’s Manitoba Telecom Services (MTS) has signed a binding agreement to sell its national long-distance and enterprise telecoms unit Allstream to US-based corporate and wholesale communications infrastructure provider Zayo Group in an all-cash CAD465 million (USD347.6 million) transaction. Zayo says that acquiring Allstream’s fibre and colocation assets will establish it as ‘the only Pan-US/Canada Communications Infrastructure provider’. Allstream has over 9,000 route kilometres of metro fibr...
Continue reading
  4071 Hits
  0 Comments
4071 Hits
0 Comments

Webinar November 24th: Move Your Enterprise Network Management To The Cloud

Webinar November 24th: Move Your Enterprise Network Management To The Cloud
NMSaaS Webinar November 24th at 2:00pm EST Are you tired of "Tool Sprawl" and large CAPEX intestments when trying to deliver Enterprise network Management for Network Monitoring, VoIP Monitoring and Config Management to your organization?  This Wedinar will provide an in depth demonstration on how to move your enterprise network to the cloud using the following solutions: Network ManagementVoIP monitoringConfiguration ManagementNetFlow Monitoring  
  3500 Hits
  0 Comments
3500 Hits
0 Comments

Webinar - 3 Steps Your Contact Centre Can Take to Survive the Holiday Rush

Webinar - 3 Steps Your Contact Centre Can Take to Survive the Holiday Rush
The holiday rush is just around the corner!  Your companies contact centre is bracing themselves for the deluge of traffic in the lead up to the end of the year and the busiest shopping period on the planet. It is the mad rush before the holiday Seasons. Even with the most sophisticated planning and science around expected peak traffic and sustained loads, there will always be that one scenario you could not foresee ... OR COULD YOU? What if you had the ability to accurately simulate the wa...
Continue reading
  3496 Hits
  0 Comments
3496 Hits
0 Comments

Healthcare IT Reveals Network Rx

Healthcare IT Reveals Network Rx
IT Heroes: A Prescription for Network Health Each and every day, the bold men and women of IT risk it all to deliver critical applications and services. Their stories are unique. Their triumphs inspire. For the first time ever, the IT Heroes Series offers a revealing glimpse into the secrets and strategies that have won accolades for network teams around the world – and could do the same for you. Initial Symptoms Located in South West England, the Northern Devon National Health Service (NHS...
Continue reading
  3843 Hits
  0 Comments
3843 Hits
0 Comments

BCE revenue increased 2.9% in Q3

Bell Canada Enterprises (BCE) has posted total operating revenue of CAD5.345 billion (USD4.061 billion) in Q3 2015, up by 2.9% year-on-year, while quarterly adjusted EBITDA was up 3.4% to CAD2.187 billion on positive growth across all Bell operating segments, reflecting y-o-y increases of 8.3% at Bell Wireless, 1.1% at Bell Wireline and 0.5% at Bell Media. Q3 net customer additions reached 68,000 in IPTV, 58,000 in fixed broadband and 77,655 post-paid mobile customers, while Bell also reported n...
Continue reading
  3135 Hits
  0 Comments
3135 Hits
0 Comments

Seven Reasons To Analyze Network Traffic With NetFlow

NetFlow allows you to keep an eye on traffic and transactions that occur on your network. NetFlow can detect unusual traffic, a request for a malicious destination or a download of a larger file. NetFlow analysis helps you see what users are doing, gives you an idea of how your bandwidth is used and can help you improve your network besides protecting you from a number of attacks. There are many reasons to analyze network traffic with NetFlow, including making your system more efficient as well ...
Continue reading
  2824 Hits
  0 Comments
2824 Hits
0 Comments

ThreatARMOR Reduces Your Network’s Attack Surface

2014 saw the creation of more than 317 million new pieces of malware. That means an average of nearly one million new threats were released each day. Here at Ixia we’ve been collecting and organizing threat intelligence data for years to help test the industry’s top network security products. Our Application and Threat Intelligence (ATI) research center maintains one of the most comprehensive lists of malware, botnets, and network incursions for exactly this purpose. We’ve had many requests to l...
Continue reading
  3480 Hits
  0 Comments
3480 Hits
0 Comments

Customization Nation with Sapling Digital Clocks

No matter the product, everyone has different tastes and styles they prefer. Because of this, people really enjoy the ability to customize the items they purchase to meet these preferences. Giving customers the option to personalize their product or service has benefited many different companies in many different industries. Let’s take the shoe industry as an example. Nike has been wildly successful with the Nikeid option on their website. This option gives their patron the option to customize a...
Continue reading
  3206 Hits
  0 Comments
3206 Hits
0 Comments

The Network Design and Equipment Deployment Lifecycle

As we all know, technology has a life cycle of birth, early adoption, mainstream, and then obsoletion. Even the average consumer is very in touch with this lifecycle. However, within this overarching lifecycle there are “mini” lifecycles. One of these mini lifecycles that is particularly important to enterprises is the network design and equipment deployment lifecycle. This lifecycle is the basic roadmap of how equipment gets deployed within a company data network and key a topic of concern for ...
Continue reading
  3794 Hits
  0 Comments
3794 Hits
0 Comments

Key Factors in NCCM and CMDB Integration - Part 2 – Change Configuration and Backup

In Part 1 of this series I discussed how an NCCM solution and a CMDB can work together to create a more effective IT inventory system. In this post, I will be taking that a step further and show how your change configuration process will benefit from integration with that same CMDB. In general, the process of implementing IT infrastructure change happens at 3 separate stages of an assets lifecycle. Initial deployment / provisioningIn production / changesDecommissioning / removal In each of these...
Continue reading
  2901 Hits
  0 Comments
2901 Hits
0 Comments

Infosim® Announces Release of StableNet® 7.5

Infosim®, the technology leader in automated Service Fulfillment and Service Assurance solutions, today announced the release of version 7.5 of its award-winning software suite StableNet® for Telco and Enterprise customers. StableNet® 7.5 provides a significant number of powerful new features, including: Dynamic Rule Generation (DRG); a new and revolutionary Fault Management concept REST interface supporting the new StableNet® iPhone (and upcoming Android) app Highly customizable dashboard ...
Continue reading
  3712 Hits
  0 Comments
3712 Hits
0 Comments

How Testing Solutions Reduce Risk & Improve Customer Satisfaction

Imagine you're trying to book a flight. You call the toll-free number and use the interactive voice response (IVR) to get through to bookings, but instead you are put through to the baggage area. You hang up and try again, but this time you wind up speaking to the airline lounge. Do you try a third time or call a competitor? I know what I would do. The IVR is now a key component to delivering a great customer experience, so what steps should a business take to ensure these systems are working op...
Continue reading
  5582 Hits
  0 Comments
5582 Hits
0 Comments

Infosim® Global Webinar Day October 29th, 2015 StableNet® 7.5 - What's New?

Join Harald Hoehn, Senior Developer and Consultant with Infosim®, for a Webinar and Live Demo on the latest information regarding StableNet® 7.5 This Webinar will provide insight into: StableNet® 7.5 New Features such as: New Web Portal [Live Demo] New Alarm Dashboard [Live Demo] New NCCM Structurer [Live Demo] DRG (Dynamic Rule Generation) as a new and revolutionary Fault Management concept StableNet® 7.5 Enhancements such as: Enhanced Weather Maps [Live Demo] Improved Trap- and Syslog-Forwardi...
Continue reading
  2442 Hits
  0 Comments
2442 Hits
0 Comments

Two Ways Networks Are Transformed By NetFlow

According an article in techtarget.com "Your routers and switches can yield a mother lode of information about your network--if you know where to dig." The article goes on to say that excavating and searching through endless traffic data and logs manufactured by your network system is a lot like mining for gold, and punching random holes to look for a few nuggets of information isn't very efficient. Your search will be much more fruitful if you know where to look and what it will look like. Fort...
Continue reading
  2697 Hits
  0 Comments
2697 Hits
0 Comments

Webinar- Best Practices for NCCM

Most networks today have a “traditional” IT monitoring solution in place which provides alarming for devices, servers and applications. But as the network evolves, so does the complexity and security risks and it now makes sense to formalize the process, procedures, and policies that govern access and changes to these devices. Vulnerability and lifecycle management also plays an important role in maintaining the security and integrity of network infrastructure. Network Configuration and Change M...
Continue reading
  2993 Hits
  0 Comments
2993 Hits
0 Comments

SDN/NFV – From Theory to Praxis with Infosim® StableNet®

InterComms talks to Marius Heuler, CTO Infosim®, about Infosim® StableNet® and the management and orchestration of SDN and NFV environments Marius Heuler has more than 15 years of experience in network management and optimization. As CTO and founding member of Infosim®, he is responsible for leading the Infosim® technical team in architecting, developing, and delivering StableNet®. He graduated from the University of Würzburg with a degree in Computer Science, holds several Cisco certifications,...
Continue reading
  3231 Hits
  0 Comments
3231 Hits
0 Comments

Don’t Be Lulled to Sleep with a Security Fable. . .

Once upon a time, all you needed was a firewall to call yourself “secure.” But then, things changed. More networks are created every day, every network is visible to the others, and they connect with each other all the time—no matter how far away or how unrelated. And malicious threats have taken notice . . . As the Internet got bigger, anonymity got smaller. It’s impossible to go “unnoticed” on the Internet now. Everybody is a target. Into today’s network landscape, every network is under the t...
Continue reading
  3638 Hits
  0 Comments
3638 Hits
0 Comments

5 Reasons Why You Should Include LAN Switches in Your NCCM Scope

We’ve been doing a lot of blogging around here lately about NCCM and the importance of having an automated configuration and change management system. We’ve even published a Best practices guide for NCCM. One of the main points in any NCCM system is having consistent and accurate configuration backups of all of your “key” devices. When I ask Network Managers to name their key devices, they generally start with WAN / Internet routers and Firewalls. This makes sense of course because, in a modern ...
Continue reading
  2249 Hits
  0 Comments
2249 Hits
0 Comments

5 Perks of Network Performance Management

Network performance management is something that virtually every business needs, but not something that every business is actively doing, or even aware of. And why should they? While understanding the technical side of things is best left to the IT department, understanding the benefits of a properly managed network is something that will help get the business managers on board, especially when good performance management solutions might be a cost that hadn't been considered. So what are the ben...
Continue reading
  2806 Hits
  0 Comments
2806 Hits
0 Comments

Remote Location Testing? Transmit WiFi Traffic at a Remote Site for 12 Hours with LANforge WiFIRE

CT523-328-2ac-1n-bat LANforge WiFIRE 802.11a/b/g/n/ac 3 radio WiFi Traffic Generator (with Battery) Supporting 328 Virtual STA Interfaces The CT523-328-2ac-1n-bat wireless traffic generator is an excellent choice for testing Access Points and other WiFi networks. The CT523-328-2ac-1n-bat uses a modified Wireless driver for WiFi NICs based on the Atheros chipset. The ath9k (a/b/g/n) chipset NICs can support up to 200 stations per radio. The ath10k (a/b/g/n/ac) chipset NICs can support up to 64 st...
Continue reading
  3469 Hits
  0 Comments
3469 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
740 Augusta Dr.
Suite 202
Kingston, ON  K7P 0R5
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.

Latest Blog Posts

Latest Blog Posts