
FiberStar选择Incognito Software Systems优化光纤网络并提高Wi-Fi服务质量
温哥华,不列颠哥伦比亚省--(BUSINESS WIRE)--(美国商业资讯)--印度尼西亚领先光纤运营商PT. Mega Akses Persada( FiberStar) 宣布与全球宽带业务协调、设备管理和网络智能OSS解决方案领导者 Incognito Software Systems 达成合作,部署其 数字体验(DX)解决方案 ,以实现多厂商设备统一管理并优化Wi-Fi服务质量。通过Incognito的解决方案,FiberStar将利用市场领先的TR-069和Wi-Fi管理能力,提升服务开通、性能管理和故障处理等关键客户体验。
FiberStar致力于设计、建设和运营高质量开放式光纤基础设施,助力企业客户和通信服务商在印尼200个城市提供三网融合服务。为此需要一套强大的设备管理系统,能够支持全网光网络终端(ONT)的端到端配置与监控,同时实现家庭Wi-Fi性能的可视化管理。凭借Incognito解决方案的灵活架构和标准化特性,该部署项目仅用数周即告完成,使FiberStar快速提升了服务交付能力。
Incognito的DX解决方案为FiberStar提供家庭Wi-Fi性能的实时可视化,支持跨厂商设备的远程诊断、主动排障和无缝配置更新。这将确保连接优化、减少服务中断并加速Wi-Fi问题解决,从而提升客户满意度和信任度。
该解决方案的核心功能包括:
基于标准的TR-069设备管理与配置,兼容任何网络接入方式,也不依赖供应商;
集中管理设备配置(含固件更新、重启及参数修改),简化运维流程;
先进的服务质量管理功能,可验证连接质量、执行全网自动化监控及单设备诊断;
实时告警与报告,提供网络性能及长期趋势的深度洞察。
FiberStar总裁董事Sugiharto Darmakusuma表示,'FiberStar始终致力于为印尼全国客户提供顶级光纤服务,通过采用Incognito成熟的运营商级解决方案,我们既能提升运营效率,又能持续满足印尼IT市场日益增长的需求,并超越客户期望。'
为确保项目顺利实施,Incognito与 PT Multipolar Technology Tbk 通力合作, 确保为FiberStar顺利部署DX解决方案。Multipolar Technology在理解网络需求、协调利益相关方协作及保障平滑实施方面发挥了关键作用,有力增强了FiberStar的服务能力。
Multipolar Technology电信与公共事业部客户管理总监Yugi Edison表示,"通过与Incognito合作,Multipolar Technology为FiberStar提供了符合电信标准的顶尖设备管理解决方案(FTTH多厂商ONT管理系统),助其打造卓越的连接体验。我们期待继续与FiberStar合作,推动本地区技术创新。"
Incognito首席执行官Gary Knee强调,'Incognito很荣幸能助力FiberStar实现网络发展目标。DX解决方案的快速部署为FiberStar光纤网络设备提供了全网可视化管控能力,有助于降低成本、减轻运维团队压力,并全面提升用户服务质量。'
关于Incognito Software Systems Inc.
Incognito Software Systems Inc. 是一家提供服务协调软件及服务的科技公司,致力于帮助数字服务供应商管理新一代宽带体验。公司成立三十年来,已为America Movil、Cox、Digicel、Globe和Orange等全球200余家客户提供解决方案,利用其解决方案快速推出光纤创新宽带服务和5G固定无线接入技术,同时保障卓越的客户体验。Incognito Software Systems现为Lumine Group(TSXV: LMN)旗下企业。请访问 www.incognito.com ,或关注我们的 LinkedIn 和 X(Twitter) 账号。
免责声明:本公告之原文版本乃官方授权版本。译文仅供方便了解之用,烦请参照原文,原文版本乃唯一具法律效力之版本。
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
2 hours ago
- Yahoo
Verizon celebrates 25 years of powering how people live, work and play
Marking a quarter century of reliability and innovation, Verizon looks ahead to shaping the future of technology and empowering the next generation of digital connections NEW YORK, June 30, 2025 (GLOBE NEWSWIRE) -- For 25 years, Verizon has been leading with technology and innovation for our customers and helped shape the way Americans connect every day. What started as a bold vision in 2000 has grown into a company with the most wireless retail connections in the industry and a network of technological breakthroughs that empowers millions of people to live, work and play in new, connected ways. Today, Verizon is marking our 25th anniversary by celebrating our past and looking to the future: building smarter networks, supporting communities and equipping the next generation "For 25 years, our purpose has been rooted in our name: Veritas, delivering the truth and reliability that our customers trust, and Horizon, always looking forward,' said Hans Vestberg, Chairman and CEO of Verizon. 'This is why we've built the nation's most reliable 5G network. But it's the people behind it — our V Team — who give us our heart. As we celebrate our past, our focus is firmly on the future: extending our leadership with intelligent solutions to connect every home and business to the possibilities of tomorrow." 25 years of firsts Verizon's story is one of constant innovation. From pay phones to flip phones to smartphones, to rolling out 4G LTE nationwide, to being one of the first major carriers to launch fiber to the home with Fios, to pioneering the first 5G mobile network, Verizon has kept America and its customers at the forefront of technology. Along the way, our 'Can you hear me now?' campaign has become a cultural touchstone, reminding consumers that reliability matters. A commitment to communities Verizon's legacy is more than technology. In moments of crisis, like 9/11 and Hurricanes Katrina, Sandy and countless other natural disasters, Verizon teams work around the clock to keep families and first responders connected when they need it most. Our disaster resiliency work has since expanded to work with communities at risk of natural disasters year-round to empower them to be prepared for and able to recover from these disasters with greater confidence and connectivity. Building on Verizon's support of communities, our commitment to closing the digital divide has brought digital skills training to nearly 9 million students through Verizon Innovative Learning. And, we know that staying connected isn't just about access — it's about supporting the well-being of the communities we serve by encouraging healthy relationships with technology. Through free resources that help parents guide their children's tech use, and partnerships with digital wellness organizations, Verizon is working to ensure that everyone can navigate the digital world safely and confidently. Investing in America's small businesses Verizon's Small Business Digital Ready program offers a free online platform — designed in partnership with small business owners, for small business owners — featuring 50+ free courses such as AI automation, social media marketing, financial planning, as well as peer networking, community events and one-on-one coaching. To date, the program has supported more than 500,000 businesses. In addition, Verizon is opening doors for small businesses with our new Small Business Supplier Accelerator program — a commitment to spend $5 billion with small business suppliers over the next five years to help small businesses grow and thrive by working with Verizon and other large corporations. The Next 25: An AI-powered, customer-first future and expanding America's most-reliable 5G network As part of this vision, Verizon's pending acquisition of Frontier Communications represents a landmark expansion of our fiber footprint, poised to bring premium fiber connectivity to millions of new households. For the enterprise, Verizon AI Connect puts us at the forefront of powering the emerging AI economy, combining our industry-leading intelligent network with our expansive data center assets to deliver AI workloads at scale. At the same time, Verizon is redefining the customer experience with a suite of AI-powered enhancements. Key features include a 'Customer Champion' team, where a dedicated expert leverages Google's Gemini AI models to resolve complex issues from start to finish. This is complemented by new 24/7 live chat support and a redesigned My Verizon app that uses AI to provide proactive solutions. This is the latest chapter in a 25-year story of innovation with Verizon setting a new standard of how to connect customers at home and on the go. Verizon Communications Inc. (NYSE, Nasdaq: VZ) powers and empowers how its millions of customers live, work and play, delivering on their demand for mobility, reliable network connectivity and security. Headquartered in New York City, serving countries worldwide and nearly all of the Fortune 500, Verizon generated revenues of $134.8 billion in 2024. Verizon's world-class team never stops innovating to meet customers where they are today and equip them for the needs of tomorrow. For more, visit or find a retail location at VERIZON'S ONLINE MEDIA CENTER: News releases, stories, media contacts and other resources are available at News releases are also available through an RSS feed. To subscribe, visit Media contact: Adi Wineland in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Hamilton Spectator
3 hours ago
- Hamilton Spectator
Topicus.com Inc. successfully completes inaugural €200 million Schuldschein loan
TORONTO, June 30, 2025 (GLOBE NEWSWIRE) — Inc. (the 'Corporation') (TSXV: TOI) today announced that its subsidiary, Coöperatief U.A., has successfully obtained a €200 million senior unsecured Schuldschein loan. The Schuldschein loan was initially launched at €100 million and was subsequently doubled on the back of significant interest from institutional lenders. The Schuldschein loan is structured in several tranches at variable rates, with €79.5 million maturing in 3 years, €105.5 million maturing in 5 years and €15 million maturing in 7 years. The proceeds of the Schuldschein loan are expected to be used for general corporate purposes and M&A. It will also contribute to and improve the Corporation's capital structure and debt maturity. About Inc. is a leading pan-European provider of vertical market software and vertical market platforms to clients in public and private sector markets. Operating and investing in countries and markets across Europe with long-term growth potential, Inc. acquires, builds and manages leading software companies providing specialized, mission-critical and high-impact software solutions that address the particular needs of customers. For further information, contact: Inc. Jamal Baksh, Chief Financial Officer 416-861-9677 Email: jbaksh@ Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release. Forward Looking Statements Certain statements herein may be 'forward looking' statements that involve known and unknown risks, uncertainties and other factors that may cause the actual events to be materially different from any future events expressed or implied by such forward -looking statements. Words such as 'may', 'will', 'expect', 'believe', 'plan', 'intend', 'should', 'anticipate' and other similar terminology are intended to identify forward looking statements. Forward looking statements in this press release include, but are not limited to, the use of the proceeds of the Schuldschein loan. Such forward looking statements involve significant risks and uncertainties, should not be read as guarantees of future results, and will not necessarily be accurate indications of whether or not such results will be achieved, or when such results will be achieved. A number of factors could cause actual results to vary significantly from the results discussed in the forward looking statements. These forward looking statements reflect current assumptions and expectations regarding future events and are made as of the date hereof and the Corporation assumes no obligation, except as required by law, to update any forward looking statements to reflect new events or circumstances.


Associated Press
3 hours ago
- Associated Press
6G Foundry: Securing the Future of Mobile Connectivity
As we look ahead to the next decade of mobile connectivity, now is a good time to consider how security needs could evolve: Since the foundation for secure connectivity was established with 3GPP Release 15, 5G security has been continuously enhanced. Each subsequent release strengthened the security of the connectivity we rely on today. With the rise of massive parallel computing, AI tools trained on large datasets and quantum computing, which all make for more capable threat vectors, the importance of securing connectivity, compute and AI has never been stronger. As efforts to shape 6G within the 3GPP ecosystem gather momentum, now is the time to look closer at securing the future of mobile connectivity. Welcome to the seventh installment of the 6G foundry series, where we explore 6G native security, robust trust frameworks and quantum-safe security to build a secure 6G on top of the existing secure 5G foundation that is resilient against known and imaginable future threats. 6G native security In this section, we look at ways to fundamentally improve security in the 6G access stratum (AS), which includes the radio access network (RAN) and the user equipment (UE). By addressing key areas such as secure control messages, enhanced mobility security, flexible user plane (UP) security termination points and user identity privacy, we aim to build a resilient 6G foundation. Secure control messages Ensuring the confidentiality and authenticity of control messages is key to building a secure foundation for 6G. 5G AS security currently defines security at the packet data convergence protocol (PDCP) layer to safeguard control plane traffic for the radio resource control (RRC) protocol and UP traffic such as internet protocol (IP). However, there is no security protection for control messages at the lower layers, such as medium access control (MAC) elements (CEs). Manipulation of these elements can degrade or disrupt the link, such as with timing advance, transmission configuration indicator and buffer status report messages. Additionally, side channel information leakage, such as UE mobility patterns, has been shown to be possible (e.g., in the paper 'Stealthy Location Identification Attacks Exploiting Carrier Aggregation ( SLIC )'). Radio link control (RLC) and PDCP status reports are also currently not protected, where manipulation can potentially lead to packet loss, unnecessary duplication or radio link failure. To counter these possible threats, 6G AS security could be improved by incorporating MAC layer security alongside the existing PDCP security to ensure comprehensive protection of all control messages and UP traffic. Enhance security for RAN mobility Security for RAN mobility is a potential enhancement for 6G native security, focusing on a robust key hierarchy for enhanced forward security1 during mobility. In the current 5G framework, key changes are facilitated by the Xn interface (i.e., RAN-based mobility necessitate RRC signaling, with the source gNB supplying the key to the target gNB via the Xn interface). Additional RRC signaling for intra-cell handover at the target gNB is therefore required to support forward security. However, this process could delay key separation between gNBs and impacts the preparation of the gNB key (KgNB) at multiple gNBs for features such as subsequent L1/L2 triggered mobility (LTM). To address these challenges, 6G key change procedures could be enhanced with forward and backward security2 by design, with vertical key derivation for a change in gNB during handover. This approach ensures the connection at the target gNB node remains secure even if the keys at the source gNB node are compromised. Additionally, supporting multiple concurrent AS key preparations at different RAN nodes (gNBs) will enhance the overall security and flexibility of the 6G network. Bring flexibility to user plane security termination points UP data could be made more secure by allowing different UP termination points tailored to specific application or service needs. In the context of 5G, a UE might connect to multiple centralized unit user plane nodes (CU-UPs) of a gNB, each corresponding to a different protocol data unit (PDU) session. However, this setup introduces potential security threats, such as the lack of key separation when multiple user planes are configured for a single UE, particularly for different PDU sessions or network slices. Moreover, binding the UP security key of a CU-UP to a centralized unit control plane (CU-CP) managed key (i.e., KgNB) can lead to frequent key changes especially for highly mobile UEs, which will incur significant signaling overhead for low-complexity Internet of Things (IoT) devices. To resolve these issues, we propose designing 6G AS security to support key separation for different UP termination points based on network deployment, UE mobility patterns and service security requirements, while maintaining protocol consistency to the UE and enabling service-specific configurations. Improve user identity privacy in the RAN A key aspect of 6G security is keeping user identities private, which includes the privacy of RAN temporary identities (RNTIs). In 5G networks, a cell-RNTI (C-RNTI) is assigned during the random access channel (RACH) procedure and updated during mobility events. However, long-lasting C-RNTIs (e.g., if the device remains connected at the same cell) can expose UEs to passive eavesdropping, revealing side-channel information such as the type of UE or active services through over-the-air traffic analysis. Additionally, targeted attacks may occur if a C-RNTI is linked to a UE's personal identifiers, like phone numbers or social media accounts. To mitigate these risks, in addition to the strict reallocation of globally unique temporary identifiers (GUTI) and I-RNTIs for each connection introduced in 5G, we propose to support more frequent C-RNTI reallocations in 6G for connected UEs without necessitating a new RACH procedure. This is for enhancing privacy and reducing the likelihood of tracking and targeted attacks. Also important to protecting user identity is maintaining the privacy of subscription permanent identifiers (SUPI). In 5G, the subscription concealed identifier (SUCI) calculation relies on elliptic curve integrated encryption scheme (ECIES), which is expected to be replaced by post-quantum cryptography (PQC) in 6G. PQC algorithms, while promising, have large public key and cipher text sizes, resulting in substantial SUCI sizes. For example, a PQC algorithm such as Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) would result in 100s of additional bytes of overhead compared to ECIES used in 5G. As we investigate the adoption of PQC algorithms for generating SUCI, a symmetric key-based approach for 6G that leverages USIM credentials could minimize SUCI size overhead. This method involves sending an encrypted private mobile subscription identity (PMSI) to the UE during the authentication and key agreement (AKA) procedure, with the UE using the PMSI in subsequent attach or registration processes, ensuring robust and efficient privacy protection. Robust trust frameworks Establishing a robust trust framework for 6G would facilitate a secure, resilient and adaptable network infrastructure, capable of withstanding modern cyber threats and ensuring the integrity and confidentiality of communications. In this section, we look at some key areas of focus at Qualcomm Technologies for achieving such a framework: isolated UE security contexts at each network function, zero trust architecture (ZTA) based on NIST tenets and robust security setup via message digest. Isolate UE security contexts at each network function (NF) 5G NAS messages are securely exchanged between the UE and the AMF. However, the current architecture has a single NAS security termination point at the AMF, which presents limitations and potential threats. For instance, there is no generic secure communication channel between the home public land mobile network (HPLMN) and the UE when the UE is roaming, which necessitates the HPLMN relying on the visited public land mobile network (VPLMN) when delivering certain updates to the UE (e.g., UE policies). Additionally, there is no forward security with AMF relocation, meaning the source AMF knows the NAS key at the target AMF and beyond. Furthermore, the establishment of independent and isolated UE security contexts at different network functions such as the session management function (SMF) cannot be supported, resulting in a lack of end-to-end security support with the UE. Such limitations and threats are due to the 5G security anchor function (SEAF) being collocated with the AMF and only being used for initial AMF key derivation. As with AS security supporting forward security, potential 6G NAS security enhancements include an independent 6G SEAF for supporting forward security in the AMF or, more generally, for network function relocation. Furthermore, a separate security anchor at the HPLMN would support secure communication between the UE and the HPLMN when roaming, providing a generic way for the HPLMN to configure roaming UEs and enhancing home network control. Introducing an independent SEAF can further facilitate end-to-end secure communication between the UE and various network functions. Implement zero trust architecture Zero trust architecture (ZTA) is built on the NIST zero trust tenets. In the context of 5G, ZTA work by 3GPP is limited to the Core Network, while O-RAN's ZTA work focuses on the RAN. A gap analysis has been performed in 3GPP as well as in O-RAN Alliance, introducing some enhancements in the 5G system. For example, security event data and log collection, and exposure to a Security Information and Event Management (SIEM) system are being defined. Security evaluation and policy enforcement relies on proprietary solutions, which are out of the standard's scope. For 6G, developing architecture and features toward enabling ZTA is important, with potential enhancements needed to meet NIST Tenet 5 and 6. This includes evaluating the security states of the 6G system and introducing new functional elements, such as a new network function (NF). A converged RAN-Core network architecture and a common architecture for 3GPP and O-RAN need to be considered for unified security management of the 6G system, keeping in mind that ZTA is an incremental and continuous process. Ensure robust security setup via message digest In 5G AS security, common radio configurations and parameters, such as the master information block (MIB) and system information block (SIB), are not protected, potentially susceptible to false base station (FBS) attacks. The use of digitally signed system information has been discussed in the 3GPP as a possible solution. With the adoption of PQC algorithms, such signature will require thousands of bytes of additional overhead (e.g., at least 2420 bytes for module-lattice-based digital signature algorithm (ML-DSA)), and that compares poorly to current maximum SIB1 size being under 400 bytes. Apart from information broadcasts, RACH and RRC setup messages exchanged prior to the security mode command (SMC) are also not protected, leading to potential risks. Manipulation of message contents before the SMC can result in the UE being misconfigured, and adversaries can relay traffic without being detected by the UE or RAN, making the system susceptible to man-in-the-middle attacks. To enhance 6G AS, we propose including a message digest computed from the messages exchanged in the SMC, similar to how TLS computes a transcript hash as described in RFC 8446 section 4.4.1. Upon detecting an error, the system can determine whether to continue or release the connection, thereby improving the overall security and integrity of the communication process. Quantum-safe security As quantum technology progresses, traditional public key algorithms relying on the computational hardness of certain algorithms, such as integer factorization and discrete logarithm problems, face increasing threats. In particular, Shor's algorithm, which efficiently solves integer factorization and discrete logarithm problems, necessitates the development of PQC algorithms. NIST is currently standardizing these algorithms, ensuring security readiness for the Quantum era. Additionally, quantum properties enable a quadratic speed-up in unstructured database searches, posing risks to symmetric key algorithms. To counter this threat, 256-bit symmetric key algorithms like AES-256, SNOW5G, and ZUC-256 are essential for 3GPP air interface security, along with Authenticated Encryption with Additional Data (AEAD). As we move toward 6G, resilience against quantum attacks gains importance, requiring the adoption of PQC and 256-bit algorithms to safeguard communication security. Making connectivity synonymous with security and trust Advancements in connectivity, compute and AI bring unprecedented opportunities, but they also demand robust security measures to protect our digital future. At Qualcomm Technologies, our vision is to create a secure, adaptable and trustworthy mobile ecosystem that meets today's challenges and is prepared for tomorrow's threats. By addressing opportunities across the 6G radio access stratum and the RAN protocol stack, we are laying the groundwork for a resilient and secure future. Join us as we help shape the next decade of mobile connectivity with 6G. Stay tuned for more updates from the 6G Foundry. Learn more and get the latest updates: Check out our new 6G content hubSign up for our wireless technologies newsletter to stay up to dateFollow us on X Opinions expressed in the content posted here are the personal opinions of the original authors, and do not necessarily reflect those of Qualcomm Incorporated or its subsidiaries ('Qualcomm'). The content is provided for informational purposes only and is not meant to be an endorsement or representation by Qualcomm or any other party. This site may also provide links or references to non-Qualcomm sites and resources. Qualcomm makes no representations, warranties, or other commitments whatsoever about any non-Qualcomm sites or third-party resources that may be referenced, accessible from, or linked to this site. References: 1. Forward security protects the connection at the handover target RAN node against compromises of keys at the source RAN node.2. Backward security prevents the target RAN node from accessing the key used at the source RAN node after handover. Visit 3BL Media to see more multimedia and stories from Qualcomm