Tuesday, December 31, 2013

Year In Review



It seems like every media outlet spends time talking about the highs and lows of the year at this time, as if a quick summary can encapsulate twelve months of activity in just a few minutes.  I’m not going to even attempt that.  What I would like to do, however, is to thank everyone working here at Cywest for all their hard work, their devotion to our mission of providing the best possible service offerings, and for everything they do to ensure we deliver unmatched customer service.  It may be corny and it may be slightly old fashioned but I’m genuinely awestruck at the commitment levels of our personnel.  I look forward to another exciting year of innovation with them and wish all of you a Happy and Peaceful New Year!

Monday, December 9, 2013

Telco Origins – Part 5


The year is almost over and, at this point, I’ll still be telling the history of telco well into 2014.  Bear with me though. It’s an interesting story and I think it helps to explain one of the reasons why the industry now moves so slowly.  It’s as if it has forgotten about its own roots and consistently rapid historical evolution and settled into a monopolistic rut that it can’t seem to shake.

One of the things I hear from customers all the time is about the cost of connections.  As the profit margins for businesses shrink, folks look for their suppliers to respond in kind to help meet the bottom line.  In the early 1900’s, as many of these small telephone companies would veer toward bankruptcy, AT&T would buy them out in order to increase their overall customer base but intentionally refuse to link them as part of its national network.

This increased the costs of an individual call and the company’s profits as well.  By 1914 the United States was the world leader in the number of installed telephones with approximately seven million units.  Only Sweden was anywhere close, finishing a close second.  By 1930 that figure had swelled to almost 20 million units.  Did you know that, in order to make a three minute call between the United States and England in the late 1920's, it required the services of at least eight operators and close to fifteen minutes in order to make the connection?  The true surprise occurred a month later when the caller received a $75 bill for making the call.


It’s hard for those of us with unlimited calling packages and texting to imagine such an expensive proposition and it clearly thwarted many a cross continent romance back in the day.  There's an immediacy in connecting in today's global market and that capability is possible thanks to the advances of telco that followed both the telephone and radio.  More to come….

Wednesday, November 27, 2013

Thanks Giving To Our Customers

We spend so much time monitoring the systems of our customers to ensure uninterrupted uptime, developing new technology advances, or working in marketing initiatives to develop new customers that it’s easy to forget the point of this week in our nation.  Black Friday sales and the onslaught of Christmas celebrations don’t help.

When the nation was still in its infancy, its citizens recognized the true gift that was freedom and the fact that, in order for independence to prosper and grow; it took the combined efforts of everyone.  That’s truly something to be thankful for.  2013 has seen our client base continue to grow in size while our customer retention rate has stayed steady.  That’s truly something to be thankful for as well.


We know that’s only possible because those of you out there trust Cywest with your telco and security needs.  We’re grateful for that trust and we work hard to continue to earn it.  THANK YOU and Happy Thanksgiving to you and those you hold dear.

Tuesday, November 5, 2013

Elect to Make a Change


On Election Day people make a choice as to who they want to manage the government’s infrastructure for the next few years.  They know that, if those leaders fail to do a good job, they can elect a new set of leaders during the next election cycle.  It’s always felt odd to me that companies don’t take the same idea of transition to their own infrastructures.

I think there are a number of factors why business leaders don’t elect change.  There’s a certain amount of job security in the idea that people seem happy so why rock the boat.  Change requires an organizational commitment that some leadership groups can never quite muster.  Leaders don’t take the time to research their options and realize they can often do much better than their current structures – especially in the telco industry where many large providers intentionally fight against change to keep their profit margins high by overcharging unaware customers.

If it’s been more than two years since you’ve actively looked at options for your telco infrastructure, I’d urge you to do so.  While I certainly hope you’d look at a Cywest offering as part of that process, that’s not why I’m suggesting you make the effort.  It’s because I know that, if you haven’t made that serious effort, you’re paying too much for what you’re getting and not getting nearly enough.


Elect to make a change!

Monday, October 28, 2013

What is a Hacker?

Just a reminder that we’ll be conducting our webinar about network security this week so make sure you join us Halloween morning at 11 am Eastern.  If you can’t make it we’ll be recording the content for anyone interested.  Just email us at sales@cywest.com for a link.  When you’re talking network security, one of the things people often fear is a hacker accessing their info.

A hacker, in my opinion, is not something to fear.  Hackers are, by actual definition, amateurs.  They’re people who live and breathe computers and actively try to get into things simply to see if they can, and to figure out how those systems work.  Sure, a hacker can get paid for their services and break into a company’s network to steal their secrets but that’s the difference.  That person isn’t a hacker.  That person is a thief – no different than any other criminal just because it’s a digital crime - and THOSE are the people you need to guard your network from.


Asking your company’s management to invest in resources to stop hackers does not make a compelling argument.  Asking for the means to stop thieves and other digital attempts to steal your company’s intellectual property or trade secrets is what you’re actually requesting.  Don’t mute that argument by using tech jargon that lessens the importance of the conversation.

Wednesday, October 9, 2013

Ghost Protocol - Ten Ways To Avoid Network Hell Webinar... This Halloween!

This Halloween CYWEST has something special for you...
We're doing a Webinar @ 11AM EST (10/31/13).
See the announcement below:

Clicking the above image will send us an email, make sure to be specific about your network horror story and we'll select the scariest one to win the $100 American Express gift card.
(The password for the Webinar is: Halloween)


Thursday, September 19, 2013

Telco Origins – Part 4


While we often think of the telephone having the greatest impact on modern telecommunications, the invention of the radio by Guglielmo Marconi far surpassed it.   A German physicist named Heinrich Hertz actually discovered radio waves, proving that electromagnetic waves could be sent from Earth all the way into space long before anyone took one giant leap for all mankind.  Hertz never made any money off his discovery and died before it actually became a profitable venture.

Marconi had read about Hertz in the paper and realized he could use what had come to be known as Hertzian waves to create the first wireless telegraph.  By 1895 his experiments allowed him to send wireless signals for over one mile.  His native Italy would not fund Marconi’s experiments but England was more than willing, investing in its commercial development.

By 1898 the first wireless factory had opened, capable of successfully sending fully coded wireless transmissions over a distance of almost sixty miles.  As more and more ships started to use his technology, Marconi created specific dedicated circuits that could be tuned for wireless transmission and, in so doing, isolate all other transmissions to provide an uninterrupted concentrated signal.  By 1901 a signal could be transmitted successfully across the Atlantic Ocean.

Marconi’s wireless transmitter was even used on the ill-fated Titanic voyage.  While rescuers could not reach the survivors in time to save Leonardo DiCaprio from an icy death, signals transmitted using the technology helped save hundreds of others, including the eventual rescue of Kate Winslet.  My heart will carry on until next time…. 

Tuesday, September 10, 2013

2013 Annual Report on Network Security Released


Thank you to everyone who participated in our security roundtable event in Las Vegas.  The fact that we had a packed house and was able to hear and share so many stories about security challenges and issues speaks to the fact that the sharing of digital information drives commerce like never before.  Industries that manufacture and supply technological tools, from end-user devices to communications, have rushed to meet the demand of the market – unmotivated to consider the security risks and ramifications that these digital tools introduce.

The rapid pace of sharing information has also enabled the tools and programs for such nefarious activities to become mainstream. An unsophisticated individual can now easily download all of the necessary components, read a few Command Line instructions, and become just as lethal as the software’s author. As the issue of security has become more complex, Cywest has engaged in new research and development to address these concerns and bring our services, including our patented ISVNTM (Intelligently Scaled Virtual Networks) to its next evolution.


As part of our ongoing efforts to educate both our current and future customers, we’re pleased to announce the publication of our 2013 Annual Report on Network Security which was distributed to all attendees at the event.  If you’d like a printed or digital copy of the whitepaper, please contact us at sales@cywest.com.  

Friday, August 23, 2013

Telco Origins – Part 3


I know it’s been a lot longer than I’d originally planned but I wanted to get back the history of telecommunications.  I would have done so sooner but I was on the phone.  :-)  Speaking of Mr. Bell’s grand invention, once the phone had been firmly established by 1876, the first telephone switchboard was installed in Connecticut two years later in 1878.  Call volume had obviously increased, most likely due to the pioneers of telemarketing.  This was about the time that the first appearance of formal telephone numbers, and directories listing those addresses, were also made available to the public.

By the early 1880’s there were a number of small telephone exchanges throughout the USA and Europe but caller range was clearly limited.  Because of the crude technology that limited connection distance to about 100 miles, the Bell company focused on building and selling equipment to service rich people and businesses.  The first long distance connection, between New York and Boston, was approximately 300 miles long and came online in 1884.  All calls were required to be connected by a third party operator.  Had tech acronyms been popular back then they would have termed it H.O.T. (Human Operated Transfer) calling.


Bell’s patents ran out at the turn of the century leading to greater competition and the rise of several thousand independent phone companies.  Little did anyone realize at the time that, despite so many new players entering the market, the stage was being set for the start of the largest monopoly of them all – AT&T.  But first, we need to talk about a fellow named Marconi and this little invention of his called the radio.  More next time….

Friday, August 16, 2013

Viva Las Vegas


I want to take a quick break from the history of telco (rest assured, I'll get back to Ma. Bell's accomplishments next week ) and mention a Cywest road trip next week to the 36th Annual International Legal Technology Association (ILTA) Conference in Las Vegas, NV.  I'm the featured speaker at an exclusive luncheon on Tuesday regarding digital security and its impact on commerce in today's global market.  Being in Sin City, one of the things you realize is the sin so many companies have of blissful ignorance when it comes to how well they are protected.  You can implement firewalls, secure data repositories, etc and still find yourself imminently vulnerable from the most unexpected source of all:  the smart phone used by any company employee.

A number of software developers have created Mobile Device Management (MDM) solutions to address this need but most focus solely on the idea of containerization, the securing of company data on the phone from unauthorized use.  Left unattended is the fact that those same phones can be easily hacked from the outside and become infiltration agents for those who intend harm.  During the lunch, we'll be spotlighting several new technologies we have coming to market that, not only close this loophole, but empower the leaders of the targeted companies to turn the tables effectively on their hacker.

So much of the corporate mentality when it comes to security is to adopt a defensive posture, to wait for a threat or breach to occur and then react to it with all the powers at their disposal.  Unfortunately, by then at least some damage has occurred or, at best, the company is spending too much to expedite solutions.  We take the opposite view and help our customers create an offensive minded approach that more than levels the playing field.  Our solutions are unique and they're designed for the security person who understands how critical it is to be addressing the next generation of threats BEFORE they arrive.

I look forward to seeing everyone in Las Vegas and if you'd like to meet individually to discuss your firm's security or telco issues, just let me know.  For those who can't attend but would like more info about what we're developing, let me know that as well.  Safe travels to all who are making their way to the conference. 

Tuesday, August 6, 2013

Telco Origins - Part 2

One of the most common complaints about telecommunications companies are their size.  These large global conglomerates have difficulty responding quickly to their clients, or delivering a personalized suite of services that more accurately reflect on what those customers need compared to a one size fits all model.  That's where the Cywest approach actually makes a difference. We bring that level of personalization and service to fill in the gap that the large carriers aren't effectively built to do.  Everyone thinks the issue of telecommunication monopolies is relatively new, that it began over the last two decades as technology advanced heavily into both the office and the home.  This is simply not true.

In reality, Western Union, the company that we think of whenever we have to wire money in a pinch to our children, or to bail out a loved one that's had one too many, was the first telecommunications monopoly.  It was formed initially as a regional alliance of several smaller firms.  They divided up the country in sections amongst themselves, acting much like a cartel would do today in the drug trade.  The Civil War helped drive up the profits and fees of the company because the telegraph was so valuable in passing information back and forth.  The confederate states could not match the level of sophistication and connectivity of the Union army.  Had they been able to do so, the world might be a very different place.  Following the war, Western Union took over many of the lines that were built by the government, making themselves virtually the only game in town.

For several years after that, efforts were made to install telegraph lines under the water in order to expand communications globally.  Most of the early efforts, primarily sponsored by America, failed but by 1866, the first successful connection between England and America was established.  It would take another fifty years to actually get connectivity across the Pacific Ocean.

Meanwhile, a Scotsman living and working in Boston named Alexander Graham Bell was experimenting with a machine that could diagram the shapes of sound waves by tracing their vibrations.  He thought that, if he could generate moving electrical currents that corresponded to sound, he could then audibly transfer those currents to an alternate endpoint and convert them back to sound on the other end.  All he needed was a working model and some financial backing in order to test his theory.  Two wealthy backers, named Gardiner Hubbard and Thomas Sanders, financially backed Bell's experiments and helped him attain patents for his creation.  In 1875, Bell achieved the first early working telephone and filed for rights ownership in early 1876.  Even then, the telco industry was full of controversy as a man named Elisha Gray, who was doing his own experiments with acoustic telegraphy, fought unsuccessfully for the rights.

Once again, history teases us with what might have been - it's hard to think of "ringing a gray" when it's time to call the kids in for supper.

More to come...

Monday, July 22, 2013

Telco Origins - Part 1

I was giving a lecture to a group of eager young students a few years ago and I asked if any of them had an idea of who created American telecommunications.  I chuckled when one student raised their hand and guessed Ma Bell, as if that was the name of an elderly maternal woman that had launched a global industry. Part of the reason for the ignorance is that, like so much of the telco industry, the story has many facets that make it difficult to definitively trace the history.  That ends today.  I am going to tell you the annotated history of telco over the next few weeks because, in order to understand the business and its path of evolution, it helps to know the back story and how decisions and innovations have shaped our industry over the years.

You could argue that the early use of smoke signals and drums by the natives were actually the first recorded use of telecommunications.  They were used in much the same societal role as systems today - to send messages to, and communicate with, the applicable parties they wished to reach.  Can you imagine the stress of primitive IT workers way back then?  There was no such thing as an email registering a complaint; it was more likely a disgruntled colleague showed dissatisfaction by shooting the technician with an arrow or clubbing them over the head.  Job security was fleeting.

While there were basic systems developed in the late 1700's through the early 1800's resulting in the creation of the semaphore system, that system itself was abandoned several years later because the towers were way too expensive and it was difficult to find enough operators that had the skill to actually use and manage it.  The telegraph system, invented by Samuel Morse in 1844, is considered the earliest industrial iteration of successful telecommunications. Originally used primarily by the Post Office, the telegraph system actually grew and expanded along with the building of the railroad systems. These communication links  were integral in moving goods and people from East to West and back again along the tracks.  In many instances telco connectivity was established in an area before being followed by railroad construction.  No wonder "training" is such a huge requirement for our industry!  :-)

Thursday, July 4, 2013

A Day of (digital) Freedom...

As the nation celebrates its successful fight for liberty on this fourth of July, it's fascinating to note how many liberties we've willfully given up these last ten years and how that impacts security for both cloud storage and data transmission.  One of the major factors individuals and companies cite as their reason for refusing cloud based technologies is security; they stress the need to ensure privacy and corporate governance that can be better achieved if the information is on premise.


While this logic may seem sound and provide a sense of comfort, this is simply not the case.  As more information comes to light about the NSA activities and Google's own admissions about data mining, the idea that shared information is safe just because it's behind your firewall is an illusion.  In fact, leading edge cloud storage providers can actually offer greater protection of your data than private enterprises for a fraction of the cost, monitored around the clock and with better ease of use to both the client and their customers. For example, an exploit from the inside the corporate environment makes the firewall moot.  Having an outsourced partner that is more focused in the area of security, and that is also less susceptible to internal exploits (i.e. via employees, infected end-users, etc.) is actually safer than the notion of doing it “in-house”.  Just because one has physical “control”, doesn’t mean the infrastructure is safer.  

Creating truly secure environments, you see, is the ultimate dilemma - by making something more secure, you're simultaneously making that piece of information more difficult to access for the others that need it.  The ability to quickly service and respond to a client usually trumps the need for privacy.  We see that more and more as people start to employ popular applications like Dropbox and Evernote.  In this high security world we worry too much about guarding information from imagined threats and not enough about sharing it properly, securely and effectively.  Cywest Communications understands this and we're developing solutions that address the customer's need for security and ease of use specifically.  As Thomas Jefferson said, "I would rather be exposed to the inconveniences attending too much liberty, than those attending too small a degree of it."

Wednesday, June 26, 2013

The Truth...

“His priority did not seem to be to teach them what he knew, but rather to impress upon them that nothing, not even knowledge, was foolproof.”
-J.K. Rowling – “Harry Potter & The Order Of The Phoenix"

It doesn’t take a boy wizard, or the rules of magic, to understand modern telecommunications although, sometimes, it sure feels like it might.  For an industry that’s generally resistant to change it’s amazing to see the evolution of telco and how it literally now shapes the day to day operations of businesses across the globe.  Companies want to enhance their telco infrastructures, and migrate to cloud based services, but most don’t know how.  What are the best practices and how can those steps be properly quantified?  Decision makers should look directly to the telco carriers for these answers.  Unfortunately, research surveys consistently show that business and non-business decision makers don’t trust the telco carriers to give them honest answers or the best prices.  That same group doesn’t view the carriers as thought leaders in their own industry either!  There’s a knowledge gap and it grows wider every day.

I started Cywest Communications to fill that gap and I’ve been doing it successfully for our clients for more than twenty years.  What I’m going to do here on this blog is share some of that experience with a broader audience.  Hopefully, I help you become better educated in this area, and lift up the curtain on some of the industry secrets that are often used to make customers enter deals that are against their best interest.

So, why should you listen to me – an older guy with a wife, three kids and a dog that has difficulty going to the bathroom?  Hopefully it’s because you’ll find these posts to be both informative and mildly entertaining, but also because I’m going to tell you the honest truth even when it's against my own self interest, just like I did about my dog.  There’s a lot of power in the word “truth” and it’s in rare supply given today’s fast paced world of bite-size information delivery. 

Truth has a way of coming to the surface despite efforts of repression or marketing.  The truth about telco, about cloud computing, connectivity and security are subjects I’m truly passionate about and look forward to sharing with you.  Talk to you soon.