September 2008
UNIX Update;Sep2008, Vol. 19 Issue 9, p3
Trade Publication
The article reports on the additional network performance monitoring and fault management tools acquired by Pocket Communications from Telsasoft. Pocket Communications acquired the tools for their wireless network to serve their expanding network and services. The initial set of Telsasoft open source software (OSS) tools was deployed by Pocket Communications in October 2006. According to Amir Rajwany, executive vice president (EVP) and chief technology officer (CTO) of Pocket Communications, Telsasoft continue to work with them to enhance their OSS tools with a great overall value proposition.


Related Articles

  • BRITISH VIRGIN I.  // Caribbean Update;Apr2009, Vol. 25 Issue 3, p5 

    The article reports on an announcement from Telsasoft of new deployments of its alarm management, performance monitoring and Call Detail Record (CDR) analytic platforms to British Virgin Islands-based Caribbean Cellular Telephone Ltd. (CCT), Pocket Communications Northeast and Black Dolphin Ltd....

  • Mitsubishi provides Pocket's phones.  // RCR;02/17/97, Vol. 16 Issue 7, p9 

    States that Mitsubishi Wireless Communications Incorporated will provide Pocket Communications Incorporated with personal communications services equipment. Terms and conditions of an agreement between the two companies; Comments from Daniel Riker, chairman and chief executive officer of Pocket.

  • New mobile network on the way. Soule, Alexander // Fairfield County Business Journal;12/8/2008, Vol. 47 Issue 49, p10 

    The article evaluates the mobile network from Pocket Communications Inc.

  • Pocket service launches in hot Texas market. Hill, Kelly // RCR Wireless News;7/10/2006, Vol. 25 Issue 28, p4 

    This article reports on the decision of wireless company Pocket Communications to offer a flat-rate local calling plan, which is targeted at value-conscious customers. Pocket is owned and run by Paul Posner, a 17-year telecom veteran who used to own a paging business, then started a company...

  • Scoring with Customers. Alleven, Monica // Wireless Week;12/15/2006, Vol. 12 Issue 25, p13 

    The article highlights the dependence of regional wireless companies in the U.S. on localized operation. It is said that Pocket Communications has been in the telecommunication business for approximately 16 years in San Antonio, Texas. Rose Cummings, spokeswoman for Charlotte, North...

  • VoiceStream, Leap buy Pocket licenses. Weaver, Heather Forsgren // RCR Wireless News;10/16/2000, Vol. 19 Issue 42, p1 

    Reports on developments in the United States wireless industry, focusing on Cook Inlet/Voice Stream's bid for licenses owned by a Pocket Communications Inc. subsidiary, and the Supreme Court's rejection to hear the case of NextWave Telecom Inc.

  • Riding the next wave: must-have IT skills.  // Asian Pacific Post;7/19/2007, p12 

    The article reports on information technology (IT) skills. According to the author, there are skills that one has to have in order to get employed in the IT industry. Some of these needed skills are machine learning, mobilizing computer applications, general networking skills and open-source...

  • Linux violates more than 228 patents - big deal. Gibbs, Mark // Network World;11/29/2004, Vol. 21 Issue 48, p66 

    This article focuses on the impact of the allegation that Linux violates over 228 patents on the licensing costs issue of software in the U.S. This report came from a consultancy named Open Source Risk Management (OSRM). OSRM describes its mission as being based on a vision of a world made safe...

  • Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks. Malekzadeh, Mina; Abdul Ghani, Abdul Azim; Subramaniam, Shamala // Journal of Computer Systems, Networks, & Communications;2010, p1 

    In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics