Excentis staff members regularly write on technical and less technical topics in our different business areas. We hope you will find some useful gems of information here. If you have any suggestions we love to hear from you on blog@excentis.com.

Happy reading!

We need Wi-Fi everywhere! People are expecting whole-home coverage and if new features like fancy antennas or beamforming technology don't cut it, strategically placing additional Wi-Fi gear in a home should increase the coverage area. However, after setting it all up, these secondary access points, repeaters and other equipment should play nice and act as one big happy network that we can use throughout the home. To help realize this, the Wi-Fi standard provides the Wi-Fi seamless roaming functionality. Let's find out the do's and don'ts in this blogpost.
In this blog post we will build a PacketCable™ 2.0 EDVA configuration file from scratch. Assembly instructions included!
This blog post shows how to use the Dashing framework to build custom web-based dashboards to monitor the progress of ByteBlower traffic tests. With real-time graphs and gauges you can keep an eye on what's happening during your tests, regardless if you're running them from one or more test scripts or ByteBlower GUI instances.
DOCSIS 3.1 introduces a whole new range of possibilities for signing and co-signing images, as explained in a previous blog post . Getting the correct software version on each modem in the field can be an operational challenge. This blog post explains how the Excentis DOCSIS Signing Tool can help by co-signing software images.
Nothing is perfect. We all know this, and we have to live with it. However, trying to improve is a key to success. This is true for cable networks as well. A bad plant condition and interferers may degrade the communication between CM and CMTS. Luckily though there is lot of data that can be monitored to detect quite some issues.
Thanks to the power of the cloud, it's easier than ever to break the encryption as used with DOCSIS and EuroDOCSIS. Since version 3.0 of the standard it's also much easier for operators to counter these attacks, but despite having arrived at DOCSIS 3.1 already, not everyone already implements the DOCSIS 3.0 security. This blog post explains what the problem is, and more importantly: tells you how to protect your network.