Back to our home page
  • Customer support
  • Contact
  • Information and complaints
Contact Us Request callback Share content with…
Share via Facebook Share via X Xing LinkedIn
  • Solutions ▾
    • DPI for cybersecurity solutions ▾
      • DPI for SASE
      • DPI for SSE
      • DPI for firewalls
      • DPI for data loss prevention
      • DPI for SIEM and threat intelligence solutions
    • DPI for networking solutions ▾
      • DPI for DEM solutions
      • DPI for SD-WAN solutions
      • DPI for NPM and APM solutions
      • DPI for wireless networking devices
    • DPI for telco solutions ▾
      • DPI for 5G UPFs
      • DPI for telecom analytics
      • DPI for service assurance
      • DPI for network probes
      • DPI for vEPC/ 5G core vendors
    • GTP and 5G correlation for mobile networking solutions ▾
      • GTP correlation for data analytics
      • GTP correlation for policy control
      • GTP correlation for traffic management
      • GTP correlation for service assurance
      • GTP correlation for mobile network security
  • Products ▾
    • Next-gen deep packet inspection software ▾
      • DPI engine R&S®PACE 2
      • VPP DPI engine R&S®vPACE
      • Build or buy DPI
    • Monitoring solutions ▾
      • Network probe R&S®Probe Observer
    • User and control plane correlation ▾
      • GTP correlation module R&S®GSRM
  • Customer insights
  • News & media ▾
    • Overview of all resources ▾
      • Whitepapers
      • Case studies
      • Brochures
      • Webinars
      • Reports & e-books
    • Press releases
    • Trade shows & events
    • Network technology insights, trends and perspectives ▾
      • GenAI in network management
      • Analytics & AI in Open RAN
      • Application-aware SD-WANs
      • DPI & 5G
  • Blog
  • Company ▾
    • About us
    • People at ipoque
    • Our service promise
    • Our network technology and innovation experts
  • Career ▾
    • Open positions at ipoque
    • Dive deep into networks
    • Students & young professionals ▾
      • Empowering young talents - Deutschlandstipendium
  1. Home
  2. The ipoque blog

The ipoque blog

  • Share with Xing
  • Share with LinkedIn
  • Share by email
  • Share with Facebook
  • Share with X
Reset filters
A person’s hand holding a smartphone, which displays a close-up image of someone playing a guitar. The image represents visibility into OTT traffic with DPI.
Tobias Roeder | 09.01.2024
Blog post

Visibility into OTT traffic with next-gen DPI software

In this article, we discuss the expanding and multi-faceted OTT landscape and the role of deep packet inspection (DPI) in providing deep visibility and classification of OTT traffic at the application and service level. Next-gen DPI software, such as the R&S®PACE 2 and R&S®vPACE engines by ipoque, enables OTT providers and network operators to identify and navigate emerging trends while optimizing performance, security and user experience for exceptional service delivery.

More information
Three grey icons representing a coffee cup, a wifi symbol and a WC. The icons are attached on a roof and represent the concept of Wifi 7
Magnus Bartsch | 02.01.2023
Blog post

Wi-Fi needs DPI. Wi-Fi 7 needs it even more.

Just like its predecessors Wi-Fi 6 and Wi-Fi 5, Wi-Fi 7 needs real-time traffic visibility to enhance its functionalities and performance. This article discusses the advancements brought by Wi-Fi 7 and the role of deep packet inspection in supporting restricted target wake time (TWT), multi-access point coordination and multi-link operations (MLO). It looks at how DPI’s application awareness helps to optimize bandwidth, ensure high speeds and low latency while improving the security of Wi-Fi networks.

More information
a board game with colorful balls placed in a grid of holes representing the game of truth with network traffic classificaion.
Christine Lorenz | 29.08.2022
Blog post

Winning the game of truth with network traffic classification accuracy powered by DPI

As networks move towards automation, AI-based techniques such as machine learning (ML) and deep learning (DL) are employed by new architectures such as SDN to invoke and control network functions autonomously. This automation, however, hinges on both real-time traffic inputs as well as past data on protocols, applications and service types. The more accurate past classification data is, the more meaningful the algorithms and features defined in the AI systems will be. This leads to improved network responses and a higher predictive capability across networks.

More information
A stack of paper cubes with social media logos on them.
John Bonzey | 09.02.2021
Blog post

Winning in an app-centric world: How DPI’s latest traffic signatures keep networks ahead of the game

What are the latest trends in apps and what's the impact of app traffic on the security and management of IP networks? TikTok, Facebook, WhatsApp, Facebook Messenger, Instagram and Zoom have become absolutely essential for everyone, especially with the outbreak of the pandemic. How do network operators manage this increased app traffic? Read about the importance of frequently updated signature libraries for DPI in managing app traffic.

More information
Person working on a laptop at a table with a cup of coffee, representing the enterprise digital revolution.
Stephan Klokow | 21.09.2020
Blog post

How COVID-19 became the tipping point for enterprise digital revolution

Despite the widespread availability of technologies that enable remote working and the remote management of operations and assets, it wasn’t until COVID-19 started shaking up large parts of the economy that enterprises really did rethink their current operational models. This included the way employees executed their daily tasks, how they work with business assets and how their outputs are monitored. The need to steer the business out of lockdowns and movement restrictions propelled most enterprises to work on this realization and saw overnight changes in company work rules, policies and most importantly, pushed the usage of Cloud and SaaS based applications to record levels.

More information
Person’s fingers holding a small, fluffy, white cloud against a backdrop of a clear blue sky with scattered clouds, representing the idea of DPI and cloud native networks.
Sebastian Müller | 07.09.2020
Blog post

Cloud native networks: gearing up for an agile future

At one time, businesses were content deploying their own IT infrastructure, adding more hardware and appliances as transactions and operations grew. They then saw the limitations of proprietary hardware in scaling growth and saw how cloud and virtualization gave them the computing resources they needed to deploy and run their applications on a flexible, on-demand model. Efficiency gains however, are not the only push factors for the adoption of cloud-native networks.

More information
Busy office environment with individuals working at their desks and collaborating with colleagues, representing the idea of deep packet inspection and network visibility.
John Hallett | 25.08.2020
Blog post

Enhancing network visibility for SD-WAN in the era of cloud and SaaS

One of the most touted benefits of SD-WAN is the execution of network policies via dynamic provisioning of network services such as firewalls, load balancers and session controllers. With SD-WAN, centrally controlled orchestrators can now control network functions remotely, allowing network services to respond instantaneously to the type of application that is being delivered. However, to respond to the demands of the traffic and dynamically provision network services by application types, networks require network visibility through application awareness. Identifying an application, its attribute or its application family allows networks to become intelligent enforcing corresponding policies.

More information
RS image teaser PR tethering-hands typing on mobile phone
Sebastian Müller | 06.08.2020
Blog post

Tethering and the lure of data: How to make every byte count

While some CSPs have banned tethering altogether, others have threaded the path with caution by including extended terms and conditions in their service plan agreements. However, monitoring limitations and lack of transparency can render plan rules ineffective. Having real-time insights on tethering activity therefore not only allows CSPs to enforce what is agreed in their plans, but it also allows them to learn about subscriber sharing behavior and use this to expand their offerings for multi-device subscribers.

More information
back to top
Visit our linkedin social account
Blog
ipoque GmbH, a Rohde & Schwarz company

Address

Augustusplatz 9 04109 Leipzig info.ipoque@rohde-schwarz.com

© by ipoque GmbH 2026

  • Home
  • Imprint
  • Privacy Statement
  • Terms & Conditions
  • Contact
  • Customer support
  • Cookie list