Wireless
Starlink, LEO Direct-to-Device and the Future of MNO Partnerships
Key Points
- SpaceX/Starlink’s recent acquisition of EchoStar’s terrestrial spectrum licenses for its Direct-to-Device (DTD) services has the industry wondering if it is aiming to compete as a full MNO.
- While bringing its own spectrum will allow Starlink more flexibility in choosing partners, it seems a long shot to establish operations fully equivalent to an MNO.
- The spectrum deal is, however, a case in point for the emerging convergence of different access types into a seamless connectivity fabric, highlighting the need for all industry players to form ecosystems that enable converged user experiences.
Low Earth orbit (LEO) satellite constellations are on the rise, making broadband speeds available anywhere on the globe, beginning to disrupt broadband markets and changing the way we think about connectivity. This year, LEO Direct-to-Device (DTD) has matured from a concept to first commercial services.
DTD denotes the principle of connecting your everyday smartphone directly to satellites, without extra hardware in between. That’s a big deal for closing the last coverage gaps of our terrestrial networks and could make “always connected” finally mean everywhere. Players such as SpaceX’s Starlink, AST SpaceMobile and Skylo are already shaping DTD ecosystems.
The Starlink Question: From Partner to Competitor?
So far, Starlink has acted as a partner, working with mobile operators and using its licensed spectrum for DTD services. However, by acquiring EchoStar’s mobile assets (the AWS-4 and H-Block licenses in the United States, plus global Mobile Satellite Service [MSS] priority rights), SpaceX seems to have opened the door to taking on a broader role. Elon Musk even hinted at launching a mobile DTD service with indoor coverage within two years.
That development is causing industry concern. Is Starlink gearing up to become a mobile operator in its own right? Becoming a full MNO without a terrestrial network already in place would be a challenging and daunting endeavor. It would mean building terrestrial sites, deploying a mobile core, and handling billing, customer support and regulatory compliance across dozens of markets. That’s a heavy lift, even for Starlink.
Instead, this spectrum deal looks more like a strategic enabler than an all-out move into retail mobile. It gives Starlink more flexibility in its wholesale and partnership business. And realistically, it will take two to three years before we see any market impact, as both satellite constellations and handsets evolve.
Starlink’s spectrum move isn’t a declaration of war. Rather, it’s a signal. It tells us that the boundaries between satellite and terrestrial networks are dissolving, and the next chapter of connectivity will be written through collaboration, not competition.
The bigger story here isn’t about who “wins.” It’s about how everything connects. LEO DTD is becoming a key convergence layer in a world where fixed and mobile, terrestrial and satellite networks work together to keep users seamlessly connected. No single network type can cover it all, but together, they can, and partnerships are crucial to make that happen. The real opportunity lies in building converged user experiences rather than competing over who owns the access layer.
CableLabs Shapes the Connected Future
For CableLabs members, that’s an opportunity, and we’re deeply engaged in helping them understand and shape this new reality. We’re building the foundation for members to adopt, partner and innovate confidently in tomorrow’s world. Our experts are working on:
- Seamless connectivity frameworks that unify terrestrial and non-terrestrial networks.
- Simulations and techno-economic models to analyze LEO DTD and broadband capacity, performance and cost structures.
- Integration architectures that show how DTD can fit into existing cores, backends and traffic steering systems.
- Regulatory engagement to ensure that our industry’s voice is heard in spectrum and interoperability discussions.
- General Seamless Connectivity Services (SCS) to provide a ubiquitous, reliable, adaptive connectivity fabric irrespective of access type
If you’re an operator or technology partner looking to make sense of how DTD fits into your roadmap, now is the time to connect with CableLabs experts. The earlier we align on architectures, interoperability and business models, the stronger the ecosystem we can build together.
To explore the broader topic of Seamless Connectivity Services, check out the recent blog post. If you’re a member, get involved in our working group or watch the recent Seamless Connectivity Services/Mobile Optionality webinar on the Member Portal (login is required).
Wired
Coherent Optics in 2025: Scaling Speed, Efficiency and Reliability for Emerging Applications
Key Points
- Coherent optics is expanding beyond traditional long-haul networks into metro, data center interconnect, fiber access and even space-based satellite communications, driven by AI workloads and bandwidth demand.
- CableLabs has helped pioneer the next frontier of optical communications with specifications for interoperable coherent optics in access networks and the industry's first coherent passive optical network architecture and technologies.
The optical communications industry is undergoing a profound transformation. As bandwidth demands surge — driven by AI workloads, cloud-scale data centers and global satellite connectivity — coherent optics has emerged as the foundational technology enabling this next wave of innovation. From long-haul networks to metro, access, data center and even space-based links, coherent optics is redefining how we transmit data optically.
CableLabs has been instrumental in shaping this revolution, pioneering advancements in point-to-point and point-to-multipoint coherent architectures that enable greater efficiency and scalability in the optical access networks.
About a decade and a half ago, long-haul optical networks relied on Intensity Modulation and Direct Detection (IM-DD), effectively constrained to 10 Gbps, or 10G, per wavelength. Dispersion and polarization effects required complex compensation, and scaling was difficult.
The first real-world deployments of coherent optics around 2010 changed everything. By leveraging amplitude, phase and polarization — alongside powerful coherent detection and digital signal processing (DSP) — coherent systems unlocked 100G, 400G, 800G and now 1.6 Tbps transmission rates per carrier, with dramatically improved reach, spectral efficiency and capacity.
Coherent optics delivers transformative advantages across multiple dimensions:
- Spectral efficiency: Maximizes data throughput over a given spectrum, increasing overall network capacity.
- Power efficiency: Reduces energy consumption per bit transmitted, making networks more sustainable.
- Architectural efficiency: Supports flexible and scalable network designs, accommodating diverse deployment scenarios.
- Operational efficiency: Simplifies network management and provisioning, enabling easier scaling and maintenance.
The Building Blocks of Coherent Optics
What began as bulky 100G embedded modules consuming 80 watts have evolved into thumb-sized quad small form-factor pluggable (QSFP) transceivers consuming as little as 5 watts for 100G coherent in access applications. This miniaturization enables direct integration into routers and switches, transforming deployment models across network segments.
Modern coherent optical transceivers achieve unprecedented performance and efficiency through deep integration of electronics and photonics. The key building blocks are included in the diagram below.
At the core, complementary metal-oxide semiconductor (CMOS)-based Application-Specific Integrated Circuits (ASICs) and DSP enable high-speed signal processing and advanced modulation formats. These are paired with high-speed analog-to-digital converters (ADCs) and digital-to-analog converters (DACs) — now sampling at rates exceeding 300 gigasamples per second (GS/s) — to support ultra-high-capacity links such as 1.6T ZR.
Optical and electronic components are increasingly co-packaged, combining modulators, photodiodes (PD), drivers and transimpedance amplifiers (TIAs) into compact assemblies that reduce footprint and power consumption. Stable and tunable laser sources in the C- and O-bands provide multi-channel transmission capability, while advanced packaging techniques — such as wafer-level integration and liquid cooling — preserve signal integrity and thermal stability.
This holistic approach to integration not only minimizes size and cost but also enables scalable architectures for next-generation optical networks.
Technology Trends Shaping the Future
Several trends are accelerating coherent optics innovation:
- Baud and data rates: The industry surpassed 1 Tbps per carrier in 2022, with multi-carrier architectures pushing toward 3.2 Tbps.
- CMOS Moore’s Law: Continued CMOS scaling drives higher integration and lower power, with 3 nanometer (nm) nodes today and 2 nm on the horizon.
- DSP advancements: Techniques like probabilistic constellation shaping (PCS), equalization-enhanced phase noise (EEPN) equalization, digital subcarriers and advanced forward error correction (FEC) bring performance closer to Shannon’s limit (i.e., the maximum theoretical capacity at which data can be transmitted).
- Optical materials: Thin-film lithium niobate (TFLN), polymers, silicon-organic and plasmonic-organic hybrids (SOH/POH), and barium titanate (BTO) are enabling next-generation modulators for higher bandwidth and lower power consumption with compact integration compatibility.
- Laser innovation: Recent advances in laser technology are driving a shift toward low-phase-noise, high-output and cost-effective tunable and fixed lasers.
Expanding Applications: From Core to Edge — and Beyond
Coherent optics was first deployed in long-haul networks because it solved critical challenges that IM-DD could not. Today, it’s everywhere due to technology maturation, bandwidth demand and the whole ecosystem support:
- Regional and metro networks: Supporting regional connectivity with high capacity and flexibility.
- Data center interconnect (DCI): AI-driven workloads demand massive bandwidth; pluggable modules like 400ZR and 800ZR are now standard.
- Access networks: Coherent optics is now deployed at the edge, with interoperable 100G and 200G P2P transceivers reducing cost, power and complexity in fiber access environments.
- Free space optics: Coherent transceivers now enable high-speed laser links between low-earth orbit (LEO) satellites, supporting global broadband coverage.
What’s Next?
Innovation isn’t slowing down. Coherent optics is poised to move deeper into the network:
- Coherent Lite: Low-power, short-reach solutions are ideal for campus and urban deployments (up to 20 km).
- Inside the data center: As speeds climb, coherent optics may be co-packaged with switch silicon to overcome optical loss and scale bandwidth.
- Next-gen passive optical networking (PON): Coherent optics is redefining passive optical networks with higher speeds, longer reach and new architectures that support both P2MP and legacy coexistence.
CableLabs Is Leading the Coherent Frontier
While coherent optics continues to expand across the network, CableLabs is leading the charge to define what’s next. Our specifications for P2P coherent optics have enabled interoperable 100G and 200G transceivers optimized for access networks — already deployed by major operators to extend fiber reach and reduce cost, power and complexity.
We also introduced the industry’s first architecture and technologies for coherent passive optical networks (CPON), supporting 100G per wavelength with up to 512-way splits or 80 km reach. CPON enables seamless coexistence with legacy PON and P2P coherent systems, unlocking new possibilities for residential, enterprise and wireless transport.
As coherent optics moves deeper into the network, we invite the industry to collaborate with CableLabs on specifications, interoperability and deployment strategies that will shape the next decade of optical innovation.
Security
Securing Smart Homes: Protecting Networks in a Connected World
Key Points
- Advancements in smart home security standards have improved device security markedly over the last decade.
- Adapting and improving pre-existing security tools for the proliferation of smart home devices will be critical to satisfying consumers’ needs in the Experience Era.
- A CableLabs working group explores potential challenges and solutions for continuing to evolve security tool to meet the changing and surging demand of new smart devices.
Have you ever turned the car around just to make sure you turned off your oven or unplugged your iron? That same anxious instinct contrasts with the whimsical possibility of lights switching on and off as we enter or leave a room.
Imagine if, instead of being one more burden to manage, a building — and everything inside of it — could become an active assistant in consumers’ hectic lives. As we realize the Technology Vision for the industry and grow into the Experience Era of broadband innovation, these once-fantastical concepts are no longer outlandish ideas or the one-off creations of hobbyists.
Now, thanks to new advancements in smart home technology and Internet of Things (IoT) devices, it actually is possible for consumers to connect everyday appliances — ovens, irons, dishwashers, mirrors, toothbrushes… the list goes on and on — to their smart home ecosystems.
Over the last several years, smart home devices have proliferated in nearly every store you may enter or visit online. In some cases, it is now more difficult to find a “non-smart” version of a device than just a few years ago, when it was difficult to find the smart version. Just try to find a television without apps built in.
While smart home devices enhance convenience and control within consumer’s homes, concerns about their security persist. Are these smart devices truly secure? What steps can consumers take to keep their smart homes safe ?
The Hidden Complexity of Smart Devices
Smart home devices are often small and sometimes battery powered, which can make them appear simple at first glance. In some ways, using them can be as straightforward as turning a lightbulb on or off. Yet behind that simplicity lies significant complexity: connecting these devices to a network, managing software and firmware updates, handling interactions with other devices and even navigating the challenges of the initial physical installation.
For example, a smart garage door opener might be purchased and installed but onboarding frustrations may have prevented the customer from actually connecting it to the home network. Despite it not being connected to the user’s network, the device’s wireless interface may still be turned on — which can allow anyone within radio signal range to connect and potentially control it.
Recent advancements in device security have helped transform this landscape. These complexities have been redesigned with security integrated from the ground up, allowing devices to be easily and confidently onboarded to a consumer’s home network.
Standardization Has Made Smart Home Security Easier
Many smart home device manufacturers have worked hard to standardize and simplify installation and onboarding activities — which means consumers don’t need to be professional IT experts to bring a smart device into their home networks. Through these standardization processes, smart home devices enable security settings by default.
One of the more prominent smart home standards organizations is the Connectivity Standards Alliance (CSA). Matter, one specification developed within CSA, is an industry-wide initiative designed to simplify setup, interoperability and security. A Matter-certified device must meet strict requirements, so consumers can trust that essential protections are in place.
Network operators along with us here at CableLabs have been a part of these conversations within CSA, helping ensure that smart homes are not just functional, but also secure.
Practical Security With Today’s Smart Home
With smart home specifications and standards such as Matter, smart home device security is standard and user-friendly. For instance, many of the most common security recommendations are enabled by default:
- Automatic updates: Over-the-air device update capabilities are required for certification.
- Network segmentation: Devices are placed on a virtual network called a fabric, where only authenticated and authorized devices can communicate and send commands.
- Authenticity: The authentication and authorization mechanisms in place in Matter utilize the same foundational PKI technologies that ensure authenticity and enable strong encryption of home network traffic as it leaves the cable modem.
Baseline security settings on devices are now the standard in most instances. When paired with a network operator’s Wi-Fi access points and apps, it’s even easier to observe and maintain the continued security settings of these devices.
What Can Consumers Do?
Below are just a few routines that can assist users with the continued security of their smart home devices:
- Control guest access of smart home devices: If guest access is needed, guest accounts should be created through the main administrator account.
- Watch for unusual behavior: Identify when a device isn’t behaving normally. Smart home devices have much lower network bandwidth consumption. From a network provider’s app, customers can view spikes in bandwidth usage, which may signal security issues. Consumers can then take appropriate actions to ensure security.
- Retire or isolate old devices: If a device has stopped receiving automatic updates, it’s standard operating procedure to replace it.
Working to Make the Internet Safer and More Secure
Smart homes are making progress; it is much easier now than it was years ago to bring a smart home device onto a consumer’s home network. CableLabs continues to work to improve the onboarding process for these devices and make consumers’ connectivity experiences more secure — and more seamless.
When smart home devices have been certified to conform to a smart home standard, consumers can feel confident that their household devices have security controls built in.
Here at CableLabs, working alongside our member operators in our IoT Security working group, we continue to advance our secure network solutions so that smart home devices can safely and securely connect to smart homes. If you’re an employee of a CableLabs member operator and want to help shape these smarter, more secure solutions, consider joining the working group (member login required).
This work is foundational as we build networks that intelligently respond to user and device needs in the moment. By prioritizing connectivity that understands context and adapts automatically, CableLabs, our members and our industry partners are transforming how people experience their connected environment.
To learn more about the Experience Era and how it is redefining what connectivity means for consumers, read about the Technology Vision for the future of the industry.
DOCSIS
Beyond Single-Modem Speed: DOCSIS 4.0 Interop Doubles Aggregate Capacity
Key Points
- Participants in CableLabs’ October Interop·Labs event successfully verified interoperability, again proving DOCSIS 4.0 technology is ready to scale across the industry with seamless multi-vendor deployment.
- The event moved operators closer to delivering multi-gigabit services today with DOCSIS 3.1+ devices while preparing infrastructure for full DOCSIS 4.0 deployment.
CableLabs’ latest DOCSIS® 4.0 Interop·Labs event marked a major milestone for broadband technology — one that pushes the limits of aggregate downstream capacity and demonstrates the collaborative strength of the DOCSIS ecosystem.
The interop followed closely on the heels of a highly successful SCTE TechExpo25 in Washington, D.C., where suppliers showcased early demonstrations of DOCSIS 4.0 technology in action. Some of those same demos were shipped straight from the TechExpo show floor to CableLabs headquarters in Colorado for the interop event, ensuring continuity and real-world validation.
Leading suppliers convened Oct. 20–23 for the 14th DOCSIS 4.0 interop, working to verify equipment interoperability and expand the focus beyond modem performance. This time, attention turned to increasing aggregate capacity — the total bandwidth shared among groups of homes — far beyond what any single modem can achieve.
Increasing Aggregate Capacity: Beyond a Single Modem
The latest advances showcased a critical leap: the capability to boost aggregate speed. This wasn’t about the performance of a single modem but, instead, the collective capacity available to a group of homes served by a single fiber node.
A 2x2 Remote PHY Device (RPD) allows one physical fiber node to behave like two virtual nodes. A 2x2 RPD is capable of providing full spectrum service to up to two downstream service groups and 2 upstream service groups. In practice, this means an operator can effectively double the capacity of a traditional 1x1 node.
To handle this increased throughput, suppliers demonstrated 25 Gigabit Ethernet (GbE) links connecting fiber nodes to the CCAP-Core — a substantial upgrade from the standard 10 GbE links. The result: the increased DOCSIS 4.0 bandwidth is available to be shared across smaller service groups, enabling better performance and a foundation for next-generation multi-gigabit service tiers.
Innovation Through Collaboration
While the technology took center stage, the underlying story was one of collaboration. The event’s strong turnout underscored the excitement and commitment of industry stakeholders, which included many CableLabs member companies.
Nine modem suppliers — competitors in the marketplace — worked side by side to ensure that when DOCSIS 4.0 technology is deployed, it will perform reliably across the ecosystem. Each supplier brought its own hardware, firmware and feature optimizations — a combination of approaches that drove rich discussions and technical progress.
The supplier participation was impressive:
- CCAP-Cores: CommScope, Harmonic and Vecima
- Remote PHY Devices (RPDs): Calian, CommScope, Harmonic and Vecima
- Cable modems: Arcadyan, Askey, Gemtek, Hitron, Sagemcom, Sercomm, Ubee, Vantiva and WNC each brought multiple models.
- Chipmakers: Broadcom and MaxLinear provided engineering support.
With three cores in play, participants dived deep into DOCSIS 4.0’s multi-channel management — the real-time coordination of upstream and downstream channels across different parts of the RF spectrum. Each supplier’s goal was the same: to fine-tune performance and differentiate in a competitive market while ensuring seamless interoperability across all vendor combinations.
This breadth of representation reinforced that DOCSIS 4.0 is not just a specification — it’s a fully functioning, multi-vendor ecosystem.
DOCSIS 3.1 Plus: Bridging the Path to DOCSIS 4.0 Networks
The event also featured several DOCSIS 3.1+ modems — a key stepping-stone technology in the evolution of DOCSIS technology.
DOCSIS 3.1+ technology expands support for additional Orthogonal Frequency-Division Multiplexing (OFDM) channels, unlocking higher downstream speeds while maximizing the value of existing plant investments.
These aren’t theoretical gains — they were tested and verified in real time during the interop. Operators are already exploring how DOCSIS 3.1+ fits into their near-term deployment strategies, offering a cost-effective way to deliver multi-gigabit services today, while preparing for DOCSIS 4.0 networks tomorrow.
This spirit of cooperation is shaping the next phase of broadband evolution. By solving interoperability challenges together, suppliers are accelerating deployment timelines, simplifying operator adoption and ultimately delivering better experiences for consumers.
Looking Ahead: From Lab to Live Network
With this interop’s success, the message was clear: the DOCSIS community is uniting to deliver faster, higher-capacity broadband experiences to customers everywhere.
The event was another benchmark for the broadband industry’s future, offering further proof that multi-vendor DOCSIS 4.0 systems can deliver at scale. The next steps include refining firmware for even greater efficiency, expanding field trials and building the migration path toward commercial deployment.
With diverse vendor participation and clear proof of the technology’s capabilities, the path to multi-gigabit broadband has never been clearer.
CableLabs will host another DOCSIS 4.0 Interop·Labs event the week of Dec. 9, and we invite our member operators and the vendor community to join us and witness the next wave of innovation firsthand.
And don’t forget — registration is now open for the upcoming CableLabs Tech Summit, happening April 27–30, 2026, in Colorado. Built around the Technology Vision, Tech Summit is where the broadband industry comes together to align on the most critical areas shaping the future of connectivity — from strategic direction to technical execution, vendor collaboration and peer exchange.
Join us as we build a faster, smarter future of connectivity — together.
Technology Vision
Seamless Connectivity Service and Mobile Optionality: A New Era of Innovation
Key Points
- CableLabs is advancing broadband innovation with two new initiatives — Seamless Connectivity Service and Mobile Optionality — that are designed to move networks from speed-focused to adaptive, intelligent systems.
- Together, they position CableLabs member operators to deliver smarter, more resilient broadband experiences for their customers.
- CableLabs members are invited to register for a live webinar on Thursday, Oct. 30, to learn how these initiatives can revolutionize the connectivity experiences of their subscribers.
The broadband industry is evolving. Speed is no longer the only measure of value — users now expect connectivity that is seamless, secure, responsive and adaptive. CableLabs is leading this transformation through its Technology Vision and Eras of Broadband Innovation, which illustrate the network’s evolution from raw speed to intelligent, adaptive services.
To realize this vision, the industry must deliver practical solutions that leverage today’s infrastructure while paving the way for tomorrow’s innovations. Two new CableLabs initiatives — Seamless Connectivity Service (SCS) and Mobile Optionality (MO) — are doing just that.
Seamless Connectivity Service: Connectivity That Just Works
Imagine a world where you never have to think about your network connection — at home, at work or on the go. That’s the promise of Seamless Connectivity Service. This groundbreaking concept enables subscribers to enjoy a single connectivity experience across all access types — Wi-Fi, cellular, fiber, satellite or fixed wireless — without manually switching networks or managing multiple services.
SCS makes connectivity simple and transparent, ensuring applications perform reliably wherever users are. By unifying access technologies under one service, operators can deliver best-in-class reliability, security and performance — all while strengthening customer loyalty and unlocking new revenue opportunities.
What Makes SCS Unique
- Seamless Experience: Always-on connectivity across all devices and locations with no user action required.
- Integrated Security: Consistent protection and automatic failover across all network types.
- User Satisfaction: A truly effortless “it just works” experience for subscribers.
Mobile Optionality: Smarter, More Efficient Mobile Networks
While SCS redefines user experience, Mobile Optionality reimagines how operators build and scale mobile networks. By using existing hybrid fiber coax (HFC) infrastructure and unused spectrum above 2–3 GHz, MO supports 5G New Radio (NR) distribution efficiently and affordably.
With MO, operators can deploy 5G solutions that transmit over their HFC networks — achieving greater mobile densification at lower cost than traditional methods. The result is a stronger mobile experience and a competitive advantage in an increasingly crowded market.
What Sets MO Apart
- Enhanced Mobile Experience: Improved mobile performance and coverage with lower deployment costs.
- Service Differentiation: Ability for operators to deliver unique, value-driven mobile services.
- Smart Spectrum Use: Maximizing scarce spectrum resources through dense spatial reuse.
A Unified Future of Connectivity
Together, SCS and MO lay the foundation for a unified, intelligent network ecosystem. SCS simplifies and automates connectivity through unified provisioning, intelligent routing and seamless network handoffs. MO enhances this foundation by extending mobile reach and performance through innovative 5G integration with existing HFC networks.
The combination creates a reliable, adaptive connectivity fabric that moves effortlessly with users — from their living rooms to the open road.
Join CableLabs in Transforming Connectivity
CableLabs is leading the next era of broadband innovation — where seamless, intelligent networks adapt in real time to users’ needs. We invite members and vendors to collaborate with us on Seamless Connectivity Service and Mobile Optionality initiatives.
Join our CableLabs members-only webinar on Thursday, Oct. 30, to learn more about this revolutionary, industry-first offering and how it enables operators to launch new, differentiated services with strong revenue growth potential.
Register for the webinar, and learn more about joining our working groups.
Security
Addressing Emerging Cryptographic Threats in the Age of Quantum Computing
Key Points
- Threats against cryptography are evolving; among them, the threat of quantum computing is increasingly putting critical infrastructure and the data that traverses it at risk.
- Enabling cryptographic agility and leveraging it to migrate to quantum-safe cryptography are approaches that can mitigate these emerging threats.
- Through CableLabs’ Future of Cryptography Working Group, we collaborate with operators and vendors to help the industry navigate the migration to new cryptographic paradigms.
Cryptography is a foundational security technology used to protect digital information by providing the underpinnings for confidentiality, authentication and integrity. Today’s cryptographic algorithms may soon be undermined by emerging attacks, including the realization of a cryptographically relevant quantum computer (CRQC). Such attacks pose a very real and increasingly urgent threat across virtually all industries and their technologies, including broadband network infrastructure.
With cryptography and public key infrastructure being foundational to the security of cable networks, the broadband industry is uniquely positioned to rise to this challenge and seize the opportunity to future-proof networks to be robust, flexible and responsive to any cryptographic threat — quantum or otherwise. In this blog, we’ll review the threats against cryptography on the horizon, the solution to mitigate those threats and actions to start migration to new cryptographic paradigms. Many organizations, including network operators, have started taking action to plan for and execute cryptographic migrations.
The Threat: Attacks Against Cryptography
So, what exactly is the risk? To put it simply, quantum computers will one day be powerful enough to crack the asymmetric cryptography that is the basis of confidentiality, authenticity and integrity of data at all layers for virtually all devices deployed today. The current timeline for the potential development of a CRQC is 10–30 years — with increasing probability. That estimate isn’t certain, and recent research advancements suggest that it could be sooner.
While that time frame is wide, the risk of compromise is relevant today, thanks to the “harvest now, decrypt later” style of attack. In this scenario, adversaries may capture encrypted data today and retain it, planning to decrypt it once they have access to a CRQC. Any sensitive data generated today that will remain sensitive in the future (such as health records) is therefore at risk today.
The Solution: Cryptographic Agility and Post-Quantum Cryptography
So, how can the industry future-proof itself against these threats? The solution is twofold:
- Enabling cryptographic agility: Cryptographic agility is the ability to switch cryptographic systems quickly and efficiently. It’s a forward-looking design principle and capability that helps security interfaces stay flexible and adaptable in the face of all future threats.
- Post-quantum cryptography (PQC): Also called quantum-safe cryptography, these new encryption algorithms are designed to resist attacks from quantum computers. Their standardization, primarily driven by the National Institute of Standards and Technology in the United States, is a global effort that’s been ongoing for the last decade.
PQC aims to be the replacement for today’s vulnerable cryptography. Cryptographic agility is the framework by which systems will be migrated to PQC (and future iterations of cryptographic algorithms). Together, these strategies offer a path forward.
Migrating to PQC and Leveraging Existing Guidance
From existing guidance on cryptographic migrations, the CableLabs Future of Cryptography Working Group — a collaborative initiative bringing together operators, vendors and security experts to prepare for and to navigate changes to evolving cryptography — has identified certain “no-regret” actions, which can benefit network security posture regardless of whether or when the threat of a CRQC is realized. Some of these no-regret actions include:
- Establishing a cryptographic inventory: A comprehensive inventory of what cryptography is deployed is a critical artifact for any organization to compile as a first step towards cryptographic migrations.
- Assessing and estimating cryptographic agility enablement: Cryptographic agility is a deceptively simple concept; effectively enabling it begins with quantifying how cryptographically agile security interfaces are today. Tools exist today to aid in that effort.
- Discussions with vendors: Vendors play a critical role in cryptographic migrations, providing the implementation of security interfaces and concretely enabling cryptographic agility. Therefore, early and ongoing engagement with vendors on their roadmaps for enabling cryptographic agility and migrations to new cryptographic paradigms is key.
- Risk assessments and defining risk tolerance: Migration of cryptography at full organization scale is an optimization problem; undertaking risk assessment activities to identify the devices, services and interfaces that are at highest risk and should be prioritized for migration is crucial.
Taking Action Through Collaboration
Over the next decade, regulatory bodies around the world expect critical infrastructure — including broadband networks — to adopt quantum-safe cryptography. That makes the next five years crucial for operators looking to future-proof their networks and enable cryptographic agility as a key security capability. Reaching that goal will require deep collaboration, not just between network operators, but across the entire ecosystem of equipment manufacturers, software developers and standards organizations.
To ensure a smoother transition, the CableLabs Future of Cryptography Working Group is continuing to drive the foundational work to adapt current crypto migration and agility guidance to cable networks, identifying gaps therein and developing strategies to address those gaps. The working group’s mission is to develop practical, industry-specific guidance for enabling cryptographic agility as a new capability and migrating operator networks to post-quantum cryptography.
The threat may be complex, but the goal for the cable broadband industry is simple: Keep our networks — and the people who rely on them — secure for the future. To learn more or if you’re interested in contributing, the Future of Cryptography Working Group is open to CableLabs members and our vendor community. Join us here.
Security
The Malicious Economy: What Happens If Your Defenses Are Insufficient?
Key Points
- Law enforcement is dedicating greater attention to incident reporting and active threat monitoring, an encouraging trend in the fight against ransomware. Still, threat actors continue to evolve their tactics, leading to rising numbers of victims and ransomware variants.
- CableLabs collaborates with several cybersecurity organizations, including M3AAWG, with which we helped develop and maintain best practices for responding to ransomware attacks.
Ransomware has changed a lot in the past few years. The term refers to a form of malicious software loaded by attackers to restrict access to files and other data with the intention of extracting payment from the owners of that data.
CableLabs has been working to make sure that residential and business subscribers have the tools they need not only for preparedness and prevention, but also in the event that ransomware actors target them.
Let’s take a look at how the ransomware landscape has evolved, how law enforcement has changed its approach and how one important document can alter the course of your network’s future.
The Law Enforcement Front
The global climate on the regulatory, legislative and law enforcement front has changed, as you can see in the table below.
|
Technical Developments
|
Policy Involvement
|
|
Threat Actors & Threat Evolution
|
Cyber Insurance Market
|
|
Law Enforcement
|
National Security Implications
|
Evolving Threat Actor Behavior
We’re also seeing changes in threat actor behavior. There’s been a sharp increase in both the number of victims (over 200 percent) and the number of ransomware variants (over 30 percent) in 2025 — a deviation from last year’s trends.
The increased use of ransomware-as-a-service (RaaS), the open availability of threat tools and malicious actor communication all continue to evolve. No longer does the threat actor have to find a way to access systems, they can now buy opened systems and immediately move to the ransom phase. The horizontal disaggregation of the marketplace has enabled more threat actors to engage against more victims, with less technical know-how. Exploited vulnerabilities are now the primary method of malicious access, followed by compromised credentials and email/phishing.
Collaborating to Combat Threat Actors
CableLabs engages with several Information Sharing and Analysis Centers (ISACs) and anti-abuse groups. One of the more focused groups is the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), where we’re proud to have helped to both originally build (and then shepherd updates to) the “M3AAWG Ransomware Active Attack Response Best Common Practices” document.
We do this work because — although the dogma of cybersecurity defense is to prepare, prepare, prepare — the reality is that no matter how good a network’s defenses are, they can always be stronger.
The Best Common Practices document starts with advice from victims who were previously infected, moves on to steps to follow, lists numerous resources, provides a high-level view of what to expect and finally offers decision guideposts about who to involve and when. The document helps with detection, analysis and response activities; demonstrates how to communicate; and enumerates the deliverables necessary for each stage.
This document doesn’t prescribe specific behaviors, but it helps to make sure the reader is equipped with the right questions to ask, as well as the considered order of approach to tackling a problem.
There will be decisions to make about when to declare an event, whether you have reporting requirement, what law enforcement’s role will be, which disclosures are necessary, whether you pay a ransom (or whether that is legally permissible in your situation), when and how to engage on cybersecurity insurance, and what your potential negotiation options are.
There are always collateral victims in attacks like these, and there may be actions possible or preferable on those fronts that will need to be evaluated. That process is one of many that will involve others within the organization. This document helps lay out who should be considered in each step.
The Importance of Having a Plan
Everyone hopes that this aspect of the global economy will come to a decisive end but, in reality, that’s neither the trend nor the expectation. In a dangerous world, it’s best to have a plan for how your company will act in a multitude of situations — even the unpleasant ones.
The Best Common Practices document is a tool for checking existing policies, technologies and the people involved in the prevention plans, but it can also be a cheat sheet for those who have had to balance other needs against external threats and suddenly find themselves in a difficult situation.
Read the “M3AAWG Ransomware Active Attack Response Best Common Practices” document to learn more about the options that are available for victims of ransomware attacks. The document is one resource in a broader cross-sector toolkit that helps defend against and manage the risk of ransomware threats. For more, check out:
- A Cybersecurity Framework 2.0 Community Profile from the National Institute of Standards and Technology (NIST)
- StopRansomware.gov from CISA
Winston Churchill famously said, “If you’re going through hell, keep going.”
These resources can show you how.
Energy
Driving Efficiency at Scale With TV Set-Top Boxes and Internet Devices
Key Points
- The voluntary agreements continue to deliver measurable energy efficiency improvements in set-top boxes and home networking equipment as shown in the most recent annual reports.
- The U.S. agreements have been extended through 2028, and the network equipment scope is expanded to include Fixed Wireless Access equipment with T-Mobile as a new signatory.
When people think about fighting climate change, they may picture solar panels on rooftops or wind turbines on hillsides. What’s less obvious is the quiet revolution happening inside our homes — through the very devices that connect us to TV and the internet.
Three new reports from the United States and Canada tell a clear story: The everyday set-top boxes and network gear we rely on are getting considerably more efficient, cutting energy usage while keeping pace with our growing digital appetites.
Efficiency Alongside Innovation
The 2024 U.S. Small Network Equipment (SNE) Report shows how internet gateways, routers and modems — the invisible workhorses of the broadband era — are becoming far more efficient. In 2024, nearly 99% of new devices met the latest Tier 3 energy levels, far surpassing the 90% commitment under the industry’s voluntary agreement.
That achievement is striking given what these devices now do. Today’s SNE is expected to support blazing-fast internet speeds, stronger Wi-Fi signals and the growing number of connected gadgets in our homes. Naturally, those features demand more power. Yet the data shows that manufacturers and providers are finding ways to deliver these capabilities without a proportional surge in energy use.
Perhaps the most telling metric is efficiency relative to broadband speed: Since 2015, the average energy use per unit of internet speed delivered has dropped by 89%. In other words, the boxes in our living rooms and home offices are working harder than ever, but they’re doing it more efficiently.

Weighted Average Ready State Power of New SNE Purchases Relative to Broadband Speeds
Set-Top Box Energy Consumption Continues to Improve
If SNE is the silent partner of the digital home, set-top boxes are the more visible face of our entertainment. The 2024 U.S. Set-Top Box (STB) Report paints an equally successful picture. Back in 2012, digital video recorders (DVRs) were notorious power hogs. But as of 2024, the landscape looks radically different.
- National energy use from set-top boxes has dropped 73%, falling from 32 terawatt-hours in 2012 to just 8.6 TWh in 2024.
- That reduction is the equivalent of shutting down eight traditional 500-megawatt power plants for a year.
- It also equates to a $3.85 billion reduction in electricity costs and avoidance of 15.7 million metric tons of CO2 emissions in 2024 compared to 2012.

Nationwide Annual Energy Used by Set-Top Boxes in the U.S.
The reasons are twofold. First, service providers are deploying fewer set-top boxes overall, as more households switch to streaming services that don’t require them. But second — and just as importantly — the devices themselves are far more efficient. Today’s most common model, the IP-based non-DVR, uses only 26.6 kWh/year, a 78% drop compared to typical set-top boxes from a decade earlier.
Even DVRs now consume less than half the power they did when the agreement began. And for many households, cloud DVR services eliminate the need for a DVR altogether.
The Trends Continue in Canada Too
In Canada, the Canadian Energy Efficiency Voluntary Agreement (CEEVA) shows steady progress in improving the efficiency of set-top boxes and small network equipment.
According to the most recent 2024 independent annual report, 100% of new set-top boxes and 100% of small network equipment purchased met efficiency targets, surpassing the required 90%. This success reflects ongoing collaboration between service providers and manufacturers to deliver devices that use less energy while supporting modern broadband and TV services.
The data shows meaningful progress:
- Since 2017, the energy consumption of new set-top boxes in Canada has dropped 74%:

Weighted Average Energy Consumption of Purchased Set-Top Boxes
- Since 2020, the efficiency of small network equipment in Canada has improved 64% relative to broadband speed.

Weighted Average Energy Usage of New SNE, Relative to Broadband Download Speed
These impressive declines lower household energy use while maintaining the quality of service customers expect.
Continuing the Commitments
The signatories of these voluntary agreements are committed to continued success. Just recently, both the U.S. STB and SNE VAs extended their terms through 2028 with reports in 2029. More importantly, the SNE VA expanded the VA scope to include fixed wireless access (FWA) devices, increasing the residential market coverage by 13 million more subscribers, and added T-Mobile as a signatory.
The U.S. STB Voluntary Agreement brings together the largest pay-TV providers, manufacturers and energy efficiency advocate ACEEE (American Council for an Energy-Efficient Economy). Similarly, the SNE Voluntary Agreement includes the leading residential internet providers, major equipment manufacturers and Pacific Gas and Electric Company (PG&E) as the efficiency advocate. In Canada, CEEVA signatories include the country’s largest internet and pay-TV service providers and key manufacturers in close collaboration with Natural Resources Canada (NRCan).
CableLabs provides the technical leadership behind the voluntary agreements, working in close partnership with the Consumer Technology Association (CTA) and NCTA – The Internet & Television Association to deliver these measurable results.
Signatories
| U.S. STB VA | U.S. SNE VA | CEEVA |
| ACEEE, Altice USA, AT&T, AT&T/DIRECTV, Charter, Comcast, Cox, DISH Network, Frontier, Verizon, Sagemcom, Vantiva | Pacific Gas and Electric Company, Altice USA, AT&T, Charter, Comcast, Cox, Frontier, Verizon, Actiontec Electronics, ASUS, eero, Google, Linksys USA, Netgear, Plume, Sagemcom Broadband, TP-Link, Ubee Interactive, Vantiva | Bell Canada, Cogeco, Rogers, TELUS, Vidéotron, Echostar Technologies, Vantiva |
Why It Matters
Energy efficiency in household electronics doesn’t make headlines the way solar farms do. But the cumulative effect is enormous. Collectively, these voluntary industry agreements have prevented billions of dollars in electricity usage and eliminated hundreds of millions of metric tons of CO2 emissions. They’ve also shown that efficiency and innovation can go hand-in-hand: faster broadband, sharper video, and smarter networks don’t have to mean higher utility bills.
As we spend more time streaming, gaming, and connecting, it’s worth remembering that the invisible progress inside our routers and set-top boxes is part of the bigger climate solution. These improvements underscore how voluntary agreements can drive efficiency gains without compromising performance.
You can read more about energy efficiency on our blog and learn more about the voluntary agreements for the U.S. and Canada.
Technology Vision
Reshaping the Customer Experience With Agentic AI
Key Points
- Agentic AI enables proactive network issue resolution, which can reduce costly truck rolls and customer support calls for broadband operators.
- Join us at SCTE TechExpo25 this week for two sessions dedicated to agentic AI and dive further into how automation can transform network operations.
Over the last year, the term agentic AI has become ubiquitous. It’s been described as everything from a personal assistant to a replacement for human workers. In reality, agentic AI is a powerful new form of automation that is most effective when given clear tasks, guided by expert information and integrated with human-in-the-loop workflows to ensure accurate and efficient automation.
In this blog post, we explain how agentic AI is revolutionizing automation by creating systems that don’t just follow pre-programmed rules but understand and adapt to their environment, make informed decisions and take autonomous action to address real-world challenges.
What Is Agentic AI?
Agentic AI is a system composed of multiple AI agents that collaborate to complete complex tasks. Key components include:
- Planner: A planner agent leverages expert information to break down complex tasks into steps that can be distributed among agents, ensuring alignment with organizational and industry best practices.
- Supervisor: A supervisor agent uses the plan identified in the previous step to coordinate work among specialist agents. It determines task completion and manages workflow.
- Specialist: Each agent has a specific role, executing steps in the plan using assigned tools and reporting back to the supervisor.
- Tool calling: Tools are executable functions that enable agents to take autonomous action by connecting AI agents to data sources and performing specific functions.
Enhancing the In-Home Experience
For broadband operators, in-home Wi-Fi issues are a leading driver of customer support calls. It’s difficult for operators to resolve these issues remotely, and sending a field technician is both time-consuming and costly.
CableLabs is developing an agentic AI system to autonomously and proactively detect and resolve in-home network issues, transforming both in-home Wi-Fi management and access network operations — and reducing the number of support calls operators receive. The key components of these systems include:
Continuous Wi-Fi KPI Streaming and Analysis
Using OpenTelemetry and OpenWRT, Wi-Fi KPIs including jitter, latency, airtime utilization and packet loss are collected in real time. Machine learning (ML) models correlate network and application-level KPIs to determine quality of experience.
Wi-Fi Impairment Detection
If degraded performance is detected, ML models identify specific impairments:
- Congestion: Too many devices or applications competing for airtime, leading to higher latency and jitter. In real-time apps like Zoom, this can cause choppy video, skipped frames, audio dropouts or lip-sync issues.
- Signal attenuation: Weak signals from distance or interference, reducing speed and reliability. Devices with a weak signal often transmit at slower speeds (lower Modulation and Coding Scheme, or MCS, rates), consuming more airtime and potentially slowing down the entire network.
- Interference: Competing signals from nearby Wi-Fi networks or non-Wi-Fi devices (like microwaves or Bluetooth) disrupt communication. In apartment or condo buildings, overlapping signals from neighbors’ routers can crowd the airwaves, reducing capacity for everyone.
- Sub-optimal channel selection: The access point remains on or switches to a channel that is already saturated or prone to interference, often due to misconfiguration or poor channel selection logic.
- Coverage gaps (possible access point placement issue): Persistent low signal strength and throughput in certain areas of the home, often caused by the access point (AP) being too far from devices or blocked by walls/furniture. While placement can’t be confirmed from Wi-Fi stats alone, patterns in signal and performance data can indicate that moving the AP may improve coverage.
- Sticky clients: Devices remain connected to a weaker AP or frequency band instead of roaming to a stronger one, causing sustained poor performance. Because the decision to roam is often controlled by the client device, it’s not always possible for the network to force the change. However, by detecting and reporting sticky client behavior, we can provide vendors and device manufacturers with the data they need to adjust roaming logic and improve performance.
Automated Resolutions
AI agents can apply QoS mechanisms automatically to restore performance or notify the user of actions they can take, such as relocating their router or adding a Wi-Fi extender or mesh node.
Detecting and Resolving Access Network Impairments
On the access network side, signal impairment detection remains a challenge, making it harder to resolve issues that degrade a user’s quality of experience. To address this, CableLabs is developing:
Robust Impairment Detection Algorithms
These algorithms analyze upstream and downstream KPIs and data for evidence of impairments. Instead of using hard-coded, deterministic algorithms, machine learning models are trained on robust datasets of upstream and downstream KPIs. Separate ML models are used for impairment detection in each direction, yielding improved accuracy compared to a combined model. This approach, when combined with data from numerous network configurations, ensures that the impairment detection process is robust across multiple operators without needing customization for each network.
Real-Time Telemetry Data Analysis
While machine learning models can be trained on infrequently collected data, the accuracy of these models improves dramatically when data are collected more frequently. Real-time or near real-time data collection produces more accurate impairment detection models and enables real-time or near real-time impairment detection. The ML models must also be lightweight enough to run at the edge to minimize data collection costs and ensure faster impairment detection by eliminating the need to send the data to a centralized location for processing.
Agentic AI Systems for Guided Impairment Resolution
The impairment detection algorithms integrate with agentic AI systems that autonomously collect the upstream and downstream KPIs and perform impairment detection. Once impairments have been identified, the agentic AI system uses expert information to provide step-by-step resolution plans for field technicians. Instead of providing static plans, the system guides field technicians through each step, pulls real-time data from their meters and updates steps based on collected data to ensure accurate and timely impairment resolution.
What Are the Challenges?
Real-Time Data Availability
The ability to obtain real-time, streaming telemetry data from devices on the network is essential to producing accurate impairment detection algorithms, without which the proposed resolutions will not succeed in resolving the quality of experience. While real-time data can be collected from devices on the network, Simple Network Management Protocol (SNMP) is usually the only option for collecting these data but it is not fast enough to support real-time data collection at the scale required for robust impairment detection. Consequently, real-time data streaming must be supported more robustly throughout the industry to enable autonomous impairment detection and quality of experience restoration.
Edge Compute Limitations
Traditionally, edge compute devices in broadband networks, especially customer premises equipment (CPE) such as cable modems and routers, have very limited compute resources. The limited compute capabilities of these devices present challenges to running inference with ML models and small language models (SLMs) on these devices. For lightweight ML models that are not based on neural networks, the compute capabilities of CPE devices are sufficient for performing inference. Some small neural networks and very small SLMs can perform inference with the compute resources on these devices, but larger neural networks and most “edge” SLMs are not capable of running on these compute resources. Additionally, the lack of access to graphic processing units (GPUs) or neural processing units (NPUs) on CPE devices further limits the feasibility of using machine learning models and SLMs for inference at the edge. This is because it results in much slower inference latency compared with GPU- and NPU-enabled models.
Edge Storage Limitations
There is an increasing number of options for SLMs that were designed to function as AI agents on edge devices. These SLMs are small enough to run in compute-limited environments and can typically be run using only CPU instead of requiring at least one GPU; however, the weights for even the smallest of these models exceed 1 GB. Therefore, in addition to requiring sufficient edge compute for low-latency AI agent responses, the edge device must also have sufficient storage to store the weights for these SLMs. While some edge devices have enough storage to hold the weights, the compute and storage capabilities of cable modems and routers are frequently insufficient for these use cases.
Data Privacy and Security
Making real-time, streaming telemetry data available to agentic AI systems at the edge enables real-time impairment detection and autonomous impairment resolution, but it also creates an attack vector and opens questions about data governance and privacy. While edge-hosted SLMs remove concerns about sending sensitive data to cloud large language model (LLM) providers, they open concerns about malicious code being embedded in the model weights and data exfiltration through model response analysis or backdoor attacks. Additionally, careful attention must be paid to how the interfaces that provide access to network data are constructed to prevent unauthorized access and unauthorized actions by the agentic AI system.
The Road Ahead
Agentic AI provides a powerful new form of automation, enabling agents to access and interpret information from their environment and external data sources, determine the appropriate course of action and autonomously take action to resolve issues within their environment.
By leveraging agentic AI at the edge, networks can become self-healing by detecting and resolving impairments autonomously and proactively addressing degradations and potential impairments before they impact subscribers’ quality of experience. In addition to acting autonomously to maintain network quality, agentic AI systems can guide field technicians through the impairment resolution process using expert information from veteran field technicians, reducing the time required to train new field technicians and drastically reducing mean time to resolution for impairments.
Find Us at TechExpo25 and Get Involved
If you’ll be at SCTE TechExpo25 next week in Washington, D.C., connect with our team to learn how your organization can contribute to shaping network automation with agentic AI. We will delve further into the technology’s capabilities during these sessions Monday, Sept. 29, and Tuesday, Sept. 30 (times are EDT):
- Agentic AI Transforming Network Operations: Join Paul Fonte and Shafi Khan for this panel discussion on how agentic AI enhances Wi-Fi, access networks and field operations — and, ultimately, the customer experience — using predictive analytics and real-time optimization. Part of the Intelligence at the Edge block, this session is 1-2:15 p.m. Monday in Room 151 AB.
- Engineering the Future: Cloud, AI and the Rise of Agentic Systems: Megan Collins joins this panel to discuss how AI and generative AI are transforming network operations to create next-generation network architectures. This session is part of Harnessing AI for Experience and Efficiency, which runs 4–5:15 p.m. Tuesday, also in 151 AB.
As AI continues to reshape network infrastructure, your voice and expertise are critical. Whether you’re an operator, vendor or software developer, we invite you to join us in shaping the future of these technologies. CableLabs offers many working groups focused on critical areas — everything from standardizing APIs to defining secure automation frameworks — where your contributions can drive real industry impact.
Events
TechExpo25 Bound? Three Ways You Can Connect With Us in Washington
Key Points
- Each day of SCTE TechExpo25, CableLabs’ technology, policy and strategy experts will share their insights and expertise on fiber expansion, AI solutions, network convergence, customer-centric experiences and much more.
- Registration closes soon for CableLabs members-only tours of show floor exhibitors that are developing DOCSIS® 4.0 or XGS-PON technology products.
- Use this quick guide to make CableLabs engagement a priority in your TechExpo agenda.
SCTE TechExpo25 kicks off in less than a week in Washington, D.C. This year, CableLabs is going all-in to provide high-impact engagement opportunities for our member and vendor communities — from members-only sessions and guided show floor tours to live, expert-led demos showcasing the technologies that are reshaping connectivity.
If you’re already registered, this blog post is your guide to maximizing your CableLabs connections and exploring the comprehensive Technology Vision for the broadband industry. If you’re not registered yet, there’s still time — register now. (And don’t forget that employees of CableLabs member companies are eligible for complimentary full-access passes!)
Block time each day — Monday, Tuesday and Wednesday (Sept. 29–Oct. 1) — for these opportunities to go behind the scenes and dive deeper into the future of broadband. All times are EDT.
1. Live, Expert-Led Demos
Every day during show floor hours at the NCTA booth (F600)
Stop by for expert-led demos on the technologies driving the future of connectivity. Part of NCTA's experiential, policy-focused exhibit The Continuum, each demo provides direct access to our team and real-time proof of how these innovations are moving the industry forward.
- Frictionless Connectivity: Learn how Zero-Touch Onboarding automates Wi-Fi connections without apps or technical support — enabling instant, seamless and secure connections.
- Smart Networks, Seamless Experiences: Dive into Quality by Design (QbD) technology, in which apps and networks communicate automatically to fix performance issues. QbD enables smoother streaming and faster load times without any user intervention.
- Optimized Network Performance: Watch AI-powered session automation manage bandwidth across multiple devices and applications automatically. See how critical tasks like video calls maintain quality even during peak household usage.
- The Future Is Dynamic: Discover how Dynamic Spectrum Sharing (DSS) lets different technologies coexist in the same spectrum, creating abundance from scarcity and enabling seamless connectivity everywhere.
2. Members-Only Tours
Every day on the show floor
Limited spots remain for our curated tour experiences with some of the innovators behind the latest DOCSIS 4.0 or XGS-PON technology products. Some tours are already filled, but waitlists are available. Register by Thursday, Sept. 25, to join an open tour or be added to a waitlist.
- DOCSIS 4.0 Core (Tour 1): 11–11:45 a.m. Monday
- DOCSIS 4.0 CPE (Tour 2): Noon–1 p.m. Monday
- XGS-PON OLTs/ONUs (Tour 3): 10:45–11:30 a.m. Tuesday
- DOCSIS 4.0: Actives and Passives (Tour 4): 11:15 a.m.–12:10 p.m. Tuesday
- XGS-PON ONUs (Tour 5): 9:15–10 a.m. Wednesday
3. Interactive Sessions
Every day in conference rooms 146 BC, 150 AB and 151 AB
Our team is moderating panels, leading technical deep-dives and sharing the stage with industry leaders. We’ve highlighted several sessions below, and you can explore the full agenda for even more discussions on the key topics shaping the industry.
Monday
- Agentic AI Transforming Network Operations (Session block: Intelligence at the Edge) — 1-2:15 p.m., Room 151 AB
- An Automated Spectrum Analysis Framework (Session block: Analyzing, Managing and Maximizing Wireless Networks) — 1:20–2:15 p.m., Room 150 AB
- Wi-Fi Reliability (Session block: The Reliability Revolution in Wi-Fi) — 2:30–3:45 p.m., Room 150 AB
- Edge LLM Hosting (Session block: Operationalizing LLMs in the Network Ecosystem) — 4–5:15 p.m., Room 151 AB
- Emerging Fiber Technologies — How AI is Driving Innovation of Future of Transmission Networks (Session block: Speed, Intelligence and the Future of Fiber: Innovations Driving Next-Gen Transmission) — 4–5:15 p.m., Room 146 BC
Tuesday
- E.T. Phone Home: Converging Opportunities from Earth to Space (Session block: Converging Networks, Expanding Horizons) — 12:30–1:45 p.m., Room 150 AB
- Seamless Connectivity Service — CableLabs Members Only (Session block: Seamless by Design: Innovative Paths to Scalable, Always-On Networks) — 2–3:15 p.m., Room 150 AB
Wednesday
- The Transformative Impact of Coherent PON (Session block: Architecting the Future Access Platform) — 11:30 a.m.–12:45 p.m., Room 146 BC
Learn more about these sessions and exclusive opportunities in our recent blog post, plus explore the TechExpo25 agenda to discover dozens more opportunities to hear from the industry’s thought leaders across all conference tracks.
Make planning easier by downloading the TechExpo25 app from your device’s app store. For quick and easy access to these ways to connect with us, copy and paste this blog post into a new note in the app.
Ready to Join the (R)evolution?
SCTE TechExpo25 isn’t just another industry conference — it’s where the future of connectivity gets decided in real time. Join us next week to connect with the CableLabs experts who are helping lead the charge.
Can’t make it to D.C. or just want to keep your ear to the ground during the conference? Follow our coverage on LinkedIn for updates and insights.
See you soon!


