Thursday, May 31, 2007

Karuturi Networks buys Delhi-based ISP provider

Mumbai, May 19: Wholesale bandwidth supplier Karuturi Networks on Friday said it has acquired 100 per cent stake in Delhi-based internet service provider (ISP) Estel Communications for an undisclosed sum.

With the acquisition, which was jointly promoted by a Nasdaq-listed firm and a Delhi-based business group, Karuturi Networks will expand into several locations across the country, the company said in a communique to the Bombay Stock Exchange (BSE).

Estel focuses on providing end-to-end network solutions to several corporates in the IT and ITeS sectors (BPO, call centres) and has presence in Delhi, Noida, Gurgaon, Mumbai, Bangalore and Hyderabad.

The company has also developed and deployed various SMS-based business applications for sales, marketing, finance, CRM, Supply Chain Management (SCM) and HR functions.

"This acquisition attains significance as it helps expand the client base and provide a major boost to the company's Internet Services and Network business," Karuturi said.

This move will contribute significantly to the revenues and bottom line of the company starting from the second half of this financial year, it said. Shares of the company were last trading at Rs 180.90, up 3 per cent, on the BSE.

http://www.zeenews.com/articles.asp?aid=372095&sid=bus&ssid=54

The right connections

India's largest private telecom company is steadily spreading its net to other parts of the globe. With three acquisitions in the US and two in India, Videsh Sanchar Nigam Ltd (VSNL) is poised to realise its aim of becoming an end-to-end global telecom services provider.

Within a span of three years, VSNL has acquired Gemplex, US; Tyco Global Network, US; Tata Power Broadband and Dishnet DSL's ISP division in India, and Teleglobe, US, thus dramatically expanding its reach and spread of services.

Networking the world
The Gemplex deal, which began as a strategic tie-up, enabled VSNL to offer enterprise customers IP-based international virtual private network (VPN) services to over 37 countries and 530 cities around the world. It also gave the company a ready customer base in the high traffic regions of the US, Europe and the Far East.

The takeover in 2004 of Tyco, a state-of-the-art undersea cable network that spans 60,000 kilometres and the continents of North America, Europe and Asia, catapulted VSNL into the big league of international telecom providers. "This acquisition was another positive step in our ongoing drive to offer global connectivity and efficient communications solutions for our customers," affirms N. Srinath, director of operations, VSNL.

VSNL also bolstered its internet business in 2004, by acquiring Dishnet DSL's internet service provider (ISP) division. This brought in over 600 owned and franchised cybercafes and a broadband ISP service, apart from consolidating VSNL's position in the dial-up ISP space, adding 20 operating locations to its existing 30.

In the October of 2005, VSNL bought out the entire stake of Tata Power in Tata Power Broadband, bringing its fibre optic network in Mumbai and Pune under its fold. The acquisition boosts VSNL's retail broadband services, and along with the Dishnet acquisition, strengthens its internet and broadband business.

Teleglobe International Holdings, acquired in February 2006, is the latest jewel in the crown. A leading provider of international telecommunications services to ISPs, fixed and mobile network operators, Teleglobe will make VSNL the fifth-largest global carrier of voice minutes. "The Teleglobe acquisition was based on key synergy areas, including complementary global infrastructure and product offerings, as well as a shared culture," says Mr Srinath about the $239-million deal.

Tele convergence
With these acquisitions, VSNL now owns and operates one of the world's largest international mobile, data and voice networks, providing 1,400 wholesale customers and 650 enterprise customers with coverage to more than 240 countries and territories.

Each new acquisition brings VSNL closer to its dream, of becoming one of the world's largest providers of voice, internet, and bandwidth services. But there's some distance to go, and other acquisitions may be on the cards. As Mr Srinath says, "We have not closed our eyes to any opportunities overseas."

http://tata.com/vsnl/articles/20060512_around_world.htm

Public Wi-Fi Hotspot Security Tips - Why Your Data Isn't Secure and What You Can Do About It by Wade Mcmunn

An "evil twin" can be a laptop in a hacker’s backpack set-up to trick users into logging onto the Internet via their "rogue" connection by mimicking the legitimate hotspot’s network name and login page (where applicable). Once logged on, the hacker can create fake login prompts for popular email and banking applications thereby stealing the user’s most valued login credentials.

What can be done to guard against such attacks? Look for connections that offer an SSL-encrypted login page (evidenced by https versus http in the address bar and a lock in the lower right hand corner of your web browser) that has been verified as authentic by public authorities such as Thawte or Versign. 82nd Street Wireless offers such a secure connection.

Security Threat #2: Unencrypted Wireless Data

Most public Wi-Fi hotspots disable wireless data encryption standards such as WEP and WPA as one user’s "secret key" can be used by a hacker to decrypt the entire network’s traffic thus making such keys both ineffective and unnecessarily complex for public deployments. What this means is that a hacker can view your data (email and web pages) as they travel through the air between your laptop and the wireless router using command line utilities found in certain operating systems.

The solution is to use a VPN (Virtual Private Network) which creates a secure encrypted connection between your laptop and the VPN server. You can find such solutions at 82nd Street Wireless.

Security Threat #3: Inappropriate Configuration of Wireless Network Settings
Wireless local area networks were designed so that computers sharing the network could easily access and share data amongst themselves. As such, in many public hotspot deployments, a hacker can obtain direct access to your computer unless you configure your wireless network settings as follows: turn your firewall on, disable file sharing and turn ad-hoc mode off. Those setting can be found in Windows XP via Start > Settings > Network Connections > Wireless Network Connection.

82nd Street Wireless automatically disables others from accessing your device via what is referred to as "client isolation".

Security Threat #4: Operating System Vulnerabilities
As hackers are well know for exploiting operating system vulnerabilities, you’ll want to stay on top of both operating system updates and anti-virus updates which fortunately can be automated through the "automatic update" feature offered by the major brands in both product categories.

By employing the afore-mentioned security tips, your data will stay out of the unscrupulous hands of hackers while you continue to enjoy the benefits of public wireless Internet at your favorite Wi-Fi hotspot location.

About the author:

Wade McMunn is President of Wireless Internet Provider – 82nd Street Wireless @http://www.wirelessinternetprovider.net

3 Secrets to Avoid With Op-In Lists by Jane Cardinale

Aside from that, you also want to avoid any problems with the law and your internet service provider or ISP. There are now many laws and rules that are applied to help protect the privacy of the internet users from spamming and unwanted mails. With the popularity of the electronic mail as a medium for marketing because of the low cost, many company’s have seized the opportunity and have flooded many people’s e-mail accounts with promotional mail.

But, with an opt-in list, you avoid this annoyance because people subscribe to the list; they want to receive the newsletters and promotional materials. They have consented to being on the list by subscribing themselves, just don’t forget to put an unsubscribe feature everytime in your opt-in list so that you avoid any confusion. There may be times when an email account was provided when the real owner didn’t want to subscribe.

It is essential that you keep your list clean and manageable. Arrange it by using the many tools and technologies available for your opt-in list. Do not worry; your investment in this marketing strategy is well worth it with all the coverage you will get which will likely be converted into sales then to profit.

Keep yourself and your business out of trouble and potential run-ins with the law and the internet service providers. Keep your operation legit and clean. Your reputation as a legitimate businessman and a legitimate site depends on your being a straight and true marketing strategist. As a tip, here are three things to avoid when emailing your list.

1) Take notice of your unsuccessful sends. These are the e-mails that bounce. Bounced emails, also known as undeliverable messages, are those messages that, for whatever reason, were not successfully received by the intended recipient.

There are bounces that happen or occur because the server was busy at that time but can still be delivered in another time. There are also bounces because the inbox of the recipient is full at that time. There are those bounce messages that are simply undeliverable ever. The reason for this is that it may be an invalid email address, a misspelled email address, or an email address that was abandoned and erased already.

Manage your list by putting markings on those that bounce. Erase an email account from your list so that you have an accurate statistics and records as to how many are actually receiving your mail. You may also want to check the spellings of your email addresses in your list. One common mistake is when an N instead of an M is placed in the .com area.

2) Always provide an unsubscribe feature in your site and an unsubscribe link in your mails. When someone in your list files a request to be unsubscribed, always take that request seriously. If you don’t take them off your list and keep sending them your e-mails, you are now sending them spam mail.

When you are reported as a spammer, you and your business can get into a lot of trouble. You can be reported to the authorities and maybe blacklisted by many internet service providers. You will lose a lot of subscribers this way and many more in potential subscribers.

3) Do not provide pornographic or shocking and disturbing content in your newsletters. It is hard to decipher the age of the recipient and many complaints may stem from these. Controversial issues also are to be avoided to not be branded by your subscribers. Stick to the nature of your site and business.

Always remember these tips in this article so that you can have a healthy relationship with your subscribers as well as be kept within the boundaries of what is allowed in sending mails to an opt-in list.


http://articles.sakshay.in/Article/15902.html