Digital Sovereignty: the overlap and conflict between states, enterprise and citizens

Digital sovereignty is an umbrella term that refers to the ability to exercise control over digital assets, such as data, content or digital infrastructure, or over the use of those assets. While this concept has arguably existed for decades, it has gained a new currency for a number of reasons, including concerns about state surveillance,[…]

Status of 5G field trials for connected and autonomous vehicles in Europe and North America

Plum produced a report for the Telecom Technology Center on the status of field trials involving connected and autonomous vehicles (CAVs) in Europe and North America. The report provided a selection of case studies involving the use of cellular technology (4G/5G) in developing: vehicle-to-everything technologies enabling interaction with infrastructure, other vehicles, networks and pedestrians; and[…]

An assessment of HFC and FTTP options for gigabit connectivity in the UK market

With recent recognition of the need for some consideration of technologies other than full fibre, Government has shifted to consider “gigabit-capable” solutions, defined as those offering “a broadband connection of at least 1 Gbps/1,000 Mbps”. With the new Johnson Government, the schedule for nationwide access to gigabit-capable connections has also been revised from 2033 to[…]

Cross border considerations

It is a well-known scientific fact, but one that is sometimes ignored, that radio waves do not respect borders between countries and geographic regions. This means that radio networks deployed in one country or region can cause interference to networks deployed across the border. The impact of the interference can vary considerably and in the[…]

UK wireless regulation and strategy support

Plum was engaged by a leading fibre network telco operator in the UK, to review the threats and opportunities brought with developing wireless technologies such as fixed wireless access, mesh networks, and cellular systems including 5G. Our work included a review of both technology and commercial developments in the UK wireless market, and a corresponding[…]

Mobile network termination: calling time on 2G and 3G

As operators start planning their 5G deployment, one important question that should not be overlooked is what should be done about existing 2G and 3G networks. The rationale for phasing out legacy networks is to ensure that spectrum is refarmed to the most efficient technology and by doing so reduce operating costs and optimise the[…]

Unlocking value with rural broadband

Access to affordable and adequate broadband services is becoming increasingly important, as the digital component of national economies continues to grow. In this paper, we focus on the question as to how policy and strategy can be developed to enable efficient rollout of broadband services meeting the needs of rural areas, using the UK as[…]

Regulating for full fibre rollout in the UK

This paper provides a case study on how the UK is attempting to incentivise full fibre rollout (whereby every premises has a direct fibre connection), and the challenges which these proposals pose. In the past, the UK was the first to introduce the ideas of anchor product pricing and wholesale pricing freedoms. These were subsequently[…]

Plum Insight – The economics of consumer Internet of Things security

Connected consumer devices – such as smart TVs, smart thermostats and connected appliances – are becoming increasingly common. Yet the cybersecurity measures on these devices are often lacking: many such devices contain serious vulnerabilities that leave them open to attack. This imposes costs not only on the owners of such devices, but upon third parties[…]

The economics of the security of consumer-grade IoT products and services

Adding connectivity to physical devices can significantly enhance their usefulness: for instance, it can allow remote operation or monitoring of the device, improve user convenience, or increase energy efficiency. As a result, the number of connected devices has grown extremely rapidly. This growth has been accompanied by increasing concerns about cybersecurity and privacy, and nowhere[…]