Newsletter

 

For a Free Quote...

Latest Blog Posts

SNMP: The ABCs of Network Visibility

Network management and monitoring is a large topic. It includes device monitoring and management, device cluster monitoring and management,network monitoring and management, application monitoring and management, problem resolution, and elements of network security as well. In this blog, I wanted to focus on device monitoring. Devices are often ref...
Continue reading
  2217 Hits
  0 Comments
2217 Hits
0 Comments

Twelve applicants for Canadian 600MHz auction

Innovation, Science & Economic Development Canada has published the final list of twelve applicants for the upcoming national mobile frequency auction in the 600MHz band. Alongside the big three nationwide mobile operators Rogers Communications, Bell Mobility (part of Bell Canada) and Telus, the other nine applicants are: Freedom Mobile (owned ...
Continue reading
  1957 Hits
  0 Comments
1957 Hits
0 Comments

5% of Your Customer Interactions are Failing!

During a typical month we generate between 500,000 to 600,000 HeartBeat calls, and of these anywhere from 4% to 6% of these calls we encounter availability or performance issue. So, we classified these issues to see where they were coming from: ​40% - Issue with answer – busy, ring-no-answer, silence or click40% - Caller-requested information unava...
Continue reading
  2061 Hits
  0 Comments
2061 Hits
0 Comments

Can Flow Monitoring Work on Encrypted Traffic?

Encrypted traffic is on the rise. It's no longer possible to inspect the content of the communication. What does this mean for network traffic monitoring? Encrypted traffic is on the rise. In 2016, NSS Labs found out that 97% of surveyed enterprises saw an increase in encrypted web traffic. Both Let's Encrypt and Google  currently re...
Continue reading
  2437 Hits
  0 Comments
2437 Hits
0 Comments

How Resilient PNT is Used in Cybersecurity

Cybersecurity is a hot topic today. Hackers are always looking to undermine our network connections and we are always trying to protect against them.  I'm no cybersecurity expert, but I am often asked, "Can Resilient PNT be used to improve cybersecurity?" Resoundingly, "YES"  Here are a few simple examples:  1. Passwords - Most secur...
Continue reading
  2468 Hits
  0 Comments
2468 Hits
0 Comments

Candela - LANforge FIRE & ICE 5.3.8 has been Released

Release 5.3.8 adds REST automation API support, improved wave-2 WiFi performance and stability, an improved RF RADAR generator and more. See the Release Notes for more details. Click here for more releases.  New Features & Improvements Release 5.3.8 (November 13, 2018) ​ Support Virtual Router Function (VRF) in kernel 4.16 and higher....
Continue reading
  2477 Hits
  0 Comments
2477 Hits
0 Comments

Cogeco expands gigabit broadband in Quebec

Canadian triple-play cableco Cogeco Connexion has announced the availability of gigabit internet services over HFC DOCSIS 3.1 technology for residents and businesses in a number of new locations in Quebec province. Cogeco's new 1Gbps and 360Mbps (download) packages are now being offered with optimised in-premises Wi-Fi equipment in Quebecois market...
Continue reading
  2320 Hits
  0 Comments
2320 Hits
0 Comments

Webinar - StableNet® Facilitates IT Transformation in Healthcare

Join Steve Miller, Vice President of Field Sales at Global Convergence, Inc., and Paul Krochenski, Director of Strategic Sales at Infosim, Inc., for a webinar on how the Unified Network and Services Management solution StableNet® can lead the way through the zoo-of-management tools. Based on two healthcare industry use cases, we will illustrate how...
Continue reading
  1951 Hits
  0 Comments
1951 Hits
0 Comments

What Should a Portable Network Forensics Kit Look Like?

Whether you are a network forensics expert or part of a cyber-security team, you need to have the ability to intercept network traffic, and capture data packets in real-time to prevent threats and live attacks. Corporate organizations should opt for network interception and traffic capture tools according to the size and architecture of their netwo...
Continue reading
  2085 Hits
  0 Comments
2085 Hits
0 Comments

How to Analyze Flow Data with StableNet

Flow data can be one of the best tools a network engineer can use to track down issues. Flo data can be used for a variety of troubleshooting tasks, including:  ​Network performanceCapacity planningSecurity audits....and more The key to understanding how to analyze flow data is first to understand what information is contained within flow expo...
Continue reading
  4694 Hits
  0 Comments
4694 Hits
0 Comments

Webinar - Protecting Time-Sensitive Critical Infrastructure Systems

 Free 60-Minute Webinar Time-sensitive systems are facing many issues related to the use of GNSS as the sole provider of accurate timing information. In addition to jamming and spoofing threats that are gaining more visibility, GPS also has a week rollover event occurring in April 2019. Due to the 10-bit week number counter used for the GPS we...
Continue reading
  2184 Hits
  0 Comments
2184 Hits
0 Comments

What is a Leap Second and How Does It Affect Me?

A leap second is a discontinuity in the world's official timescale and is a risk for those:  ​Developing and maintaining GPS applications, and/orManaging a precise network synchronization deployment The last leap second occurred on December 31, 2016 This Essential Education topic is to assist you in understanding the leap second vuln...
Continue reading
  1829 Hits
  0 Comments
1829 Hits
0 Comments

Why the No Break Feature is Essential in Network Tapping

​Even though experts say that fiber is the future of the 21st century networks, copper is still very important, mostly because of its low cost, high performance and efficiency. These are some of the reasons industries still choose to use Ethernet Cables and why analysts forecast that the global industrial Ethernet cables market will grow at a CAGR ...
Continue reading
  4150 Hits
  0 Comments
4150 Hits
0 Comments

Exploring the Different Types of Network TAPs

In this article, we will delve deeper into the different types of TAPs and their passive and active solutions. In addition, we would also introduce a brief about Network Packet Brokers and their usability with TAP devices for added security.   To begin with, there are three types of TAP solutions. Each of these perform the same basic func...
Continue reading
  2376 Hits
  0 Comments
2376 Hits
0 Comments

How TCP Works- The Timestamp Option

In the TCP handshake, you may see an option called timestamps, shortly followed by scary-looking "TSval" and "TSecr" numbers. What are those values and how can you interpret them? Let's dig. What is a TCP Timestamp?   The timestamps option in TCP enables the endpoints to keep a current measurement of the round-trip time (RTT) of the netwo...
Continue reading
  3785 Hits
  0 Comments
3785 Hits
0 Comments

Shaw revenues up 7%, boosted by Freedom Mobile

 Canadian cableco Shaw Communications has reported its results for the quarter ended 31 August 2018 (the end of its fiscal year 2018) including its fixed network and cellular (Freedom Mobile) divisions. Revenue from continuing operations increased by approximately 7% both in the quarter and fiscal year to CAD1.34 billion (USD1.03 billion) and ...
Continue reading
  1856 Hits
  0 Comments
1856 Hits
0 Comments

Testing the No Break Feature - with Mike Pennachi

 One of the best ways to get access to your network and see what is happening on a network line is to place a network TAP that gives you full visibility without dropping any packets. However, the last thing you want to happen is that your network goes down in case of an unexpected power failure to the TAP device. To prevent network problems in...
Continue reading
  2266 Hits
  0 Comments
2266 Hits
0 Comments

Coming to a Crossroad - Visibility Nightmare in Modern Data Centers

​Virtualization technology has tremendously transformed the modern data centre. Applications and operating systems are installed into virtual machine images instead of physical machines, which in turn are executed by physical servers running a hypervisor. Virtualizing applications provide many benefits, including consolidation — running multiple ap...
Continue reading
  2387 Hits
  0 Comments
2387 Hits
0 Comments

Rogers’ Q3 revenue up 3%, largely on wireless growth

​Canadian quad-play operator Rogers Communications' total revenue grew 3% year-on-year to CAD3.769 billion (USD2.875 billion) in the third quarter of 2018, driven largely by 5% growth in mobile services turnover, whilst cable revenue inched up by 1%. EBITDA jumped 8% to CAD1.620 billion and net income improved by 17% to CAD594 million in July-Septe...
Continue reading
  2034 Hits
  0 Comments
2034 Hits
0 Comments

Bell launches Virtual Network Services for Enterprises.

Bell Canada has launched its Virtual Network Services (VNS) platform, offering enterprise customers nationwide a range of on-demand network functions that reside securely in the telco's private cloud, reports ConvergeDigest.com. Bell also announced it will be the first Canadian operator to offer a managed software-defined wide area network (SD-WAN)...
Continue reading
  2040 Hits
  0 Comments
2040 Hits
0 Comments

Contact Us

Address:

Telnet Networks Inc.
1324 Andersen Drive
Kingston, ON  K7P 0C6
Canada

Phone:

(800) 561-4019

Fax:

613-498-0075

For More Information about Telnet Networks, our products, or our services, or to request a quote please feel free to contact us directly.