Mobile network operators are used to reporting their network coverage figures in terms of the percentage of the population, which can give the...
4G take-up across Europe has been impressive, and is starting to make 2G and 3G networks look obsolete. But with a stubborn rump of subscribers, and...
Traditional MVNO models may struggle to compete in an environment of high competition and data-driven services. This article considers how MVNOs need...
Small and medium-sized businesses (SMBs) invested USD76 billion in cyber-security solutions worldwide in 2022. This figure is expected to increase at...
Taking a page from SES’ O3b in serving the Other 3 billion to tapping high-value cruise markets, Starlink is addressing mobility markets with a slew...
As the space sector experiences growth, satellite manufacturers are improving production capabilities to meet demand from players like EchoStar and...
This article summarises the findings from Analysys Mason’s latest IoT connectivity disruptors case studies report, examining how innovative...
Identifying risks associated with cyber security threats is a fundamental aspect of information security, which is part of the...
Internet access has come a long way since the 1990s, when it was effectively a ‘dial up’ phone call. Over the past two decades, optical...
The 'Non-GEO Constellations Analysis Toolkit' version 5.2 (NCAT5.2) combines hard data with analytics models and interactive visualisation tools for...