Telecommunications Industry Archives - ETI
X

Want to take a Self-Guided tour?

Tag: telecommunications-industry

Fiber Infrastructure: Exploring Cityside Fiber’s Broadband Initiatives

The following summary has been condensed for length and readability. To listen to the full discussion, click here. This episode is sponsored by ETI Software and VETRO FiberMap. Brad Hine hosts this episode of the Broadband Bunch was recorded at the Broadband Community Summit in Houston, Texas, the episode features an in-depth discussion with Jonathan […]

Insights from Industry Experts on Mapping, Data, and Bridging the Digital Divide

The following transcript has been edited for length and readability. Listen to the entire discussion here on The Broadband Bunch. The Broadband Bunch is sponsored by ETI Software. Joe Coldebella: Hello. Welcome to another episode of The Broadband Bunch. I’m Joe Coldebella, and we are in the Harrison Edwards Media Center at Mountain Connect in […]

Building Broadband: A CEO’s Journey to Bridging the Digital Divide and Overcoming Industry Challenges

The following transcript has been edited for length and readability. Listen to the entire discussion here on The Broadband Bunch. The Broadband Bunch is sponsored by ETI Software and Vetro FiberMap. Pete Pizzutillo: This episode of The Broadband Bunch is sponsored by ETI Software and VETRO FiberMap. Hello, and welcome to another episode of The […]

How AI is Transforming the Telecommunications Industry

The following transcript has been edited for length and readability. Listen to the entire discussion here on The Broadband Bunch. The Broadband Bunch is sponsored by ETI Software. Joe Coldebella: Hello and welcome to another episode of The Broadband Bunch. I’m Joe Coldebella, and we are in the Harrison Edwards Media Center at Mountain Connect […]

Cybersecurity for Broadband Providers

According to the Verizon 2023 Data Breach Investigations Report, the telecommunications industry was the second most targeted industry for cyberattacks in 2021, accounting for 16% of all breaches. The most common type of attacks were web application attacks, which exploit vulnerabilities in web applications in order to gain unauthorized access to data, systems, and networks. […]