Sharing our perspectives

The 3-GIS blog is full of insight on industry trends, new technologies, best practices, and more. Browse our latest posts below or use the drop-down menu to filter posts by category.

Hero icon

May 23, 2022 5:00:00 PM
  • Android
  • 3-GIS | Mobile

Give me more RAM: Android’s changing hardware specifications impact on 3-GIS | Mobile

As most people know, technology, particularly hardware, continues to mature and advance. I think back to the first desktop computer my family had and the jaw-dropping 128k of RAM it had and compare that to the laptop I am writing on that has 16 gigabytes of RAM. That's 16,777,216k!!! The change did not happen overnight. It happened over about 35 years in my example. While not exclusive to Android, we are seeing this evolution continue today with the new releases of the Android operating system.

Read More
May 12, 2022 11:46:57 AM
  • cloud security

Cloud security blog series - Part 5: Auditing cloud security for improvement

According to predictions in The 2020 Data Attack Surface Report1, by 2025 there will be around 100 zettabytes of data stored in the cloud globally. That’s 100 billion (100 followed by 9 zeros) GBs. Total global data storage is projected to exceed 200 zettabytes by 2025. This includes data stored on private and public IT infrastructures, on utility infrastructures, on private and public cloud data centers, on personal computing devices — PCs, laptops, tablets, and smartphones — and on IoT (Internet-of-Things) devices.

Read More
Apr 4, 2022 7:45:22 AM
  • cloud security

Cloud security series - Part 4: Response to online threats during times of elevated risk

I'd like to focus on cyber security in times of heightened threats today. As we are in unprecedented times, we need to stay alert and be smarter about how we respond.

Read More
Mar 24, 2022 3:38:53 PM
  • Fiber network design and automation
  • Telecom technologies
  • as-built

Is CAD the answer to telecom design?

Whether it be through new inventions, technological advancements, more efficient processes, or simply finding better and easier ways to do things, the way we work is evolving. In the power industry, we have evolved to create smart grid technology to understand the real-time needs of the network. In the telecommunications industry, we have evolved through hardware advancements to produce faster bandwidth capabilities and, by using artificial intelligence, anticipate and proactively address potential outage locations before the end user is impacted. The planning, designing, and documenting of these networks is also evolving to allow further access and knowledge of the networks that we deploy. As we deploy the advanced networks that are being constructed today, the management of these networks requires a different level of access and information.

Read More
Feb 11, 2022 11:24:15 AM
  • cloud security

Cloud security series - Part 3: Threat detection and initial response in the cloud

Cloud environments change fundamental assumptions in how to perform threat detection and response. A growth of new infrastructure and deployment models results in new environments with new security models and attack surfaces. In particular, shared responsibility with a cloud service provider creates potential threat visibility gaps in the attack lifecycle.

Read More
Feb 10, 2022 3:48:54 PM
Article Article
  • Fiber network construction
  • Internet service
  • RDOF
  • communications service providers

Got broadband funding? Now what?

Have you received or considered applying for public funding to complete your broadband buildout? Governments across the globe are allocating more resources than ever before to increase the availability of high-speed internet access in underserved areas. In November 2021, the United States Federal Government passed the Infrastructure Investment and Jobs Act (IIJA) allocating $65 billion1 toward the expansion and affordability of broadband coverage to aid in closing the digital divide–the largest sum set aside by the government for internet improvement initiatives in the country to date.

The passing of IIJA and similar funding initiatives have opened up space for additional opportunities in both the private and public sectors. In response, numerous proposals have been submitted in an effort to add sources of revenue or diversify offerings. However, with various avenues to achieve coverage objectives, newcomers may find themselves unsure of where to begin. Below are four considerations before starting on your grant-funded broadband projects.

 

Read More
Jan 21, 2022 4:28:41 PM
Article Article
  • cloud security

Cloud security series - Part 2: The importance of identity access management

Whenever you manage users who require access to multiple types of data in order to do their job or purchase a product, you need a strong set of standards to help you implement access controls and protect your information systems from cybersecurity threats. This is commonly known as “Identity and Access Management” (IAM).  Not only does IAM grant secure access to what you and your applications do, it also grants access to the many service-to-service calls that occur behind the scenes. An example of IAM in action is Amazon Web Service (AWS) IAM service handling more than 400 million API calls per second worldwide. Nonetheless, even if your organization only handles a single call per second, or minute, or even hour, IAM has never been more important than present day.

Read More
Jan 14, 2022 10:46:53 AM
Podcast Podcast

Two industry visionaries join to tackle telecom’s biggest challenge

So, here is a question for you: why are we often so reluctant to change in business? Is it habit? Or maybe it’s the old adage "if it ain't broke, then don't fix it"? If that is the case, then a larger question may be how do we really know when to distinguish between what technically "ain't broke" versus what is just largely inefficient? This ability to know the difference, like many, is one often borne from extensive experience.

Read More