News

All Hazard Preparation, Safety, Recovery Training (Gray Zone)

Gray Zone Threats

February 14, 2026

Gray Zone Threats (GZT) refer to ambiguous, malicious activities that fall short of open warfare but undermine stability and integrity, often involving cyberattacks, disinformation, espionage, or covert operations. In New Jersey’s Communications Sector, these threats pose significant risks to critical infrastructure, including telecommunications networks, internet services, and emergency communication systems.

Impact on Critical Infrastructure:

Disruption of Communications: GZTs can compromise or disrupt communication channels, hindering emergency response and coordination during crises.

Cyberattacks and Espionage: Malicious actors may infiltrate network systems to steal sensitive information or disable critical services, creating vulnerabilities that can be exploited further.

Disinformation Campaigns: Spread of false information can undermine public trust and interfere with operational decision-making.

Undermining Confidence: Persistent gray zone activities erode confidence in communication systems’ resilience, potentially destabilizing social and economic stability.

 Mitigation Strategies: 

  • Strengthening cybersecurity defenses.
  • Enhancing cooperation between government and private sector.
  • Implementing robust monitoring and response plans.
  • Promoting resilience and redundancy in communication networks.

Overall, Gray Zone Threats challenge the security and reliability of New Jersey’s Communications Sector, requiring vigilant, adaptive, and coordinated efforts to safeguard critical infrastructure.

Please see below Gray Zone Threats, including examples:

Gray Zone threats refer to strategies and activities that lie between traditional war and peaceful competition. They are characterized by ambiguity, deniability, and often involve non-military tools to achieve strategic objectives without triggering a full-scale conflict.

Overview of Gray Zone Threats

  • Definition: Actions intended to erode stability or influence an opponent without crossing the threshold of open warfare. They often involve cyberattacks, disinformation, economic pressure, and covert operations.
  • Characteristics:
    • Ambiguous attribution
    • Plausible deniability for actors involved
    • Use of asymmetric tactics
    • Slow, persistent, and adaptable operations

Application to Critical Infrastructure (CI)

  • Threats to CI include cyberattacks on communications, water systems, energy grids, transportation, and healthcare infrastructure.
  • Gray Zone tactics may involve:
    • Cyber intrusions causing disruptions or damage
    • Supply chain interference
    • Disinformation campaigns to undermine public trust
    • Covert influence operations targeting policy or operational decision-makers

Application to the Communications Sector

  • The communications sector is critical for societal functioning, making it a prime target.
  • Gray Zone tactics include:
    • Disrupting or degrading communication networks via cyber means
    • Spreading misinformation or disinformation through social media and other platforms
    • Exploiting vulnerabilities in telecommunications infrastructure
    • Using clandestine influence campaigns to sway public opinion or political outcomes

Implications

  • These threats challenge traditional detection and attribution methods.
  • Need for robust cybersecurity, intelligence sharing, and resilience planning.
  • Emphasis on understanding and countering ambiguous threats to protect national security and public safety.

Current Gray Zone threats facing the United States encompass a range of activities aimed at undermining national security, economic stability, and societal cohesion without provoking full-scale conflict. Key threats include:

  1. Cyberattacks and Cyberespionage
    • State-sponsored hacking campaigns targeting government agencies, critical infrastructure, and private sector entities.
    • Examples include intrusion attempts on energy grids, financial systems, and supply chains.
  2. Disinformation and Influence Campaigns
    • Efforts by Peer or Near-Peer Adversaries (Russai, China, Iran) to spread misinformation via social media platforms.
    • Aimed at sowing discord, influencing elections, and eroding public trust.
  3. Economic Coercion and Sanctions Evasion
    • Use of economic pressure, sanctions, and covert financial activities to influence U.S. policy.
    • Activities like cryptocurrency-based money laundering to evade detection.
  4. Covert Operations and Espionage
    • Attempts to clandestinely gather intelligence or influence policy through agents, private allies, or proxy groups.
  5. Maritime and Territorial Ambitions
    • Near Peer (China) actions in the Indo-Pacific, involve gray zone tactics like reclamation and harassment without direct military confrontation.
  6. Information Warfare
    • Manipulating online narratives, promoting propaganda, and leveraging social divisions to weaken societal cohesion.
  7. Biological and Environmental Manipulation
    • Potential manipulation of environmental factors or biological agents to create instability or influence regions indirectly.

These threats often blend military, intelligence, cyber, economic, and informational domains, making them complex and challenging to counter. The U.S. government continues to enhance its resilience and detection capabilities to address these evolving Gray Zone activities.

Gray Zone threats to Subsea Infrastructure and Cable Landing Stations (CLSs)

  • Remain particularly concerning due to their critical role in global communications, economic stability, and national security. These threats leverage ambiguity, deniability, and asymmetric tactics to undermine or disrupt these vital assets without triggering traditional military responses. A detailed overview includes:
  1. Cyberattacks on Sub-Sea Infrastructure and CLSs
  • Targeted Cyber Intrusions: Adversaries may attempt to infiltrate network management systems of subsea cables and landing stations, causing disruptions, data interception, or sabotage.
  • Supply Chain Exploitation: Compromising hardware or software components during manufacturing or deployment to introduce vulnerabilities.
  • Advanced Persistent Threats (APTs): State-sponsored groups could establish long-term access to monitor traffic or prepare for future disruptions, blending espionage with potential sabotage.
  1. Covert Physical Operations
  • Undersea Cable Tampering or Sabotage: Gray Zone actors might engage in clandestine cutting, tapping, or interference with subsea cables, often under cover of darkness or through disguised vessels, aiming to degrade communications without immediate attribution.
  • Vessel Incursions or Harassment: Disguised or non-military vessels may loiter near cable landing sites or anchor points, gathering intelligence or attempting physical interference.
  1. Disinformation and Influence Campaigns
  • Misleading Narratives: Propaganda to undermine confidence in the security or reliability of subsea communications, potentially creating panic or mistrust.
  • Operational Deception: Disinformation about the state of infrastructure or the presence of threats, complicating detection and response efforts.
  1. Exploitation of Vulnerabilities
  • Network Vulnerabilities: Use of cyber exploits targeting known weaknesses in SCADA (Supervisory Control and Data Acquisition) or other control systems managing cable operations.
  • Legitimacy Exploitation: Leveraging legal or diplomatic channels to create plausible deniability or delays in response, e.g., claiming routine maintenance or environmental concerns.
  1. Economic and Strategic Leverage
  • Restricting or Disabling Critical Links: Gray Zone actors might threaten or partially disable subsea cables to exert economic or political pressure, even if overtly denying involvement.
  • Influence in Policy and Decision-Making: Using cyber and influence tactics to sway regulatory or strategic decisions affecting subsea infrastructure.

Implications and Countermeasures:

  • Enhanced Cybersecurity: Robust encryption, intrusion detection systems, continuous monitoring, and regular audits of infrastructure management systems.
  • Physical Security & Surveillance: Deployment of underwater sensors, maritime patrols, and vessel monitoring around key cable landing sites.
  • International Cooperation: Sharing intelligence, best practices, and coordinated responses among nations and private operators.
  • Resilience Planning: Diversification of routes, redundant systems, and rapid repair capabilities to minimize impact from Gray Zone disruptions.
  • Attribution and Response Readiness: Developing capabilities to attribute attacks accurately and respond proportionally within the Gray Zone framework to deter future activities.

In summary, Gray Zone threats to Subsea Infrastructure and Cable Landing Stations are multifaceted, involving cyber, physical, informational, and strategic tactics. Addressing these requires a comprehensive, layered approach encompassing technological, diplomatic, and operational measures to safeguard these critical components of global communications.

Overall Analysis:

There are many recent examples of how Gray Zone tactics are employed across multiple domains and are often interconnected—cyber operations complement disinformation efforts, and economic pressures support territorial ambitions. They are designed to undermine U.S. influence, destabilize societal cohesion, and assert strategic advantages without provoking direct military conflict. The ongoing evolution of these threats requires comprehensive resilience, advanced detection, and international cooperation.

All Hazard Preparation, Safety, Recovery Training (Gray Zone) Read More »

A Rising Voice in Digital Infrastructure

A Rising Voice in Digital Infrastructure

February 11, 2026

Telecommunications has always been an industry defined by infrastructure. Massive networks, subsea cables, data centers, and the executives who built them. For decades, experience was the currency of influence and leadership tables were shaped by tenure and tradition. But as AI, high-density workloads, and global interconnection redefine the digital landscape, the question is no longer just about capacity and speed – it’s about who is shaping what comes next.

Within that evolving landscape, Emily Newman, Marketing Director at NJFX, has emerged as one of the defining voices of the next generation. Her journey is not just a personal success story. It reflects a broader shift where young leaders are no longer waiting for permission to contribute, but actively shaping the industry’s future.

Identifying the Gap

At major global conferences, the age disparity is evident. While the rooms are filled with decision-makers and influential executives, younger professionals are often underrepresented. The pipeline of emerging talent is thin not because interest was lacking, but because access is limited.

NJFX recognized this early. Under the leadership of Felix Seda, an initiative was introduced at the Pacific Telecommunications Council (PTC) to intentionally create space for younger professionals within the conference ecosystem. What began as a small, focused gathering just 8 to 13 participants quickly revealed its impact.

Emily was among those who stepped into that room. She didn’t enter as an executive. She entered as a professional eager to grow, to understand the broader industry beyond her day-to-day responsibilities, and to build meaningful relationships with peers navigating similar challenges. That decision would redefine her trajectory.

From Participant to Contributor

As the initiative evolved into what is now widely recognized as PTC Beyond, participation grew from a handful of attendees to more than 150 registered professionals by 2026. The program became permanently integrated into PTC’s agenda. Complete with curated educational sessions, targeted networking opportunities, and programming designed specifically for emerging leaders.

Emily did not remain a participant for long. She became actively involved in shaping the very initiative that had shaped her. Her engagement expanded into service on the Advisory Council, where she contributed to internal committees focused on:

Advancing PTC Beyond programming
Elevating Women in Tech initiatives
Strengthening membership engagement
Supporting strategic agenda development

Her work was not symbolic. It was operational. She helped craft agendas, support programming structure, and advocate for continued inclusion of younger voices within high-level industry discussions.

Her contributions were visible and impactful.

Emily’s consistent involvement, thoughtful perspective, and demonstrated commitment to inclusion positioned her as a natural choice to support. She was elected Vice Chair of the Advisory Council an achievement that signaled both trust and recognition from industry peers.

In this role, Emily supports the Board of Governors and contributes to advancing PTC’s broader mission across global telecommunications. Her focus remains clear: ensure the next generation is not only present, but prepared. Her ascent to Vice Chair represents more than a title. It reflects a generational shift. Proof that young professionals can influence governance, programming, and strategic direction within one of the industry’s most respected organizations.

Recognition at PTC ’26

At PTC ’26, Emily’s contributions were formally recognized when she was awarded the prestigious Next Gen Award. This award is not widely distributed. In fact, it had only been presented once before also to Felix Seda, the leader who originally championed the initiative to empower younger professionals. The moment carried weight. It symbolized continuity. It demonstrated that leadership development, when intentional, produces measurable results. It highlighted Emily as a rising force within digital infrastructure. Someone who embodies not only professional excellence but community advancement.

While Emily’s accolades are personal milestones, their impact extends far beyond individual recognition. As Marketing Director at NJFX, she has been instrumental in positioning the company as more than a carrier-neutral cable landing station. Through strategic storytelling, event leadership, and thought leadership engagement, she has helped elevate NJFX’s reputation as a forward-thinking connectivity hub—one that values both infrastructure and inclusion.

Her presence on panels, advisory boards, and industry committees reinforces NJFX’s commitment to:

Supporting young professionals
Advancing diversity and inclusion
Bridging generational gaps within telecom
Building sustainable leadership pipelines

In just three years, Emily has grown from a participant seeking guidance to an industry-recognized leader shaping conversation and strategy at the highest levels.

The Future Is Built by Those Who Show Up

Telecommunications is entering a new era defined by AI workloads, global subsea expansion, hyperscale connectivity, and digital transformation at unprecedented speed. Infrastructure must scale. Networks must evolve. But none of it happens without people.

Emily Newman’s journey underscores a simple but powerful truth: when opportunity meets initiative, industries transform. From an 8-person gathering to a permanent transformative program. From participant to Vice Chair. From attendee to award recipient. Her story reflects the kind of leadership digital infrastructure needs now.

As NJFX continues to expand its global connectivity footprint it does so with confidence that the next generation is not only ready but already leading.

A Rising Voice in Digital Infrastructure Read More »

Capacity at the Edge: How Traffic Moves Through NJFX Premium Connectivity Hub

Capacity at the Edge: How Traffic Moves Through NJFX Premium Connectivity Hub

February 9, 2026

Over the past decade, global data demand has accelerated at a pace that has fundamentally reshaped network architecture and the way digital infrastructure is designed, deployed, and operated. Hyperscalers, cloud service providers, content delivery networks, AI-driven workloads, and financial trading firms are generating unprecedented volumes of traffic that must move seamlessly across both subsea and terrestrial networks. This shift has pushed capacity requirements well beyond what legacy models were designed to support and has placed renewed focus on the physical locations where global connectivity converges.

Traditionally, a cable landing station (CLS) has functioned as a handoff point rather than an active network node. Once a subsea cable reaches land, traffic is typically transferred onto terrestrial backhaul and transported to a separate data center or internet exchange for routing, peering, and distribution. While this architecture has served the industry for decades, it introduces several structural limitations in today’s high-capacity environment. Backhauling traffic from the CLS to an external facility increases latency, adds operational complexity, and creates additional points of failure along the network path. It also concentrates risk along a limited number of terrestrial routes, reducing true diversity once traffic exits the landing station. From a security and resiliency standpoint, each additional handoff represents a new exposure point, particularly for latency-sensitive, regulated, or mission-critical workloads.

As traffic volumes continue to increase, so does the need for localized interconnection at the point of landing. Enterprises, content providers, financial networks, and cloud platforms are seeking to exchange traffic as close to the CLS as possible in order to minimize latency, reduce transport costs, and retain greater control over routing, performance, and security. This demand fundamentally challenges the passive CLS model and exposes its growing misalignment with modern network design. The traditional separation between subsea termination, terrestrial transport, and interconnection is becoming increasingly inefficient as port speeds rise and applications become more sensitive to delay and disruption.

NJFX has taken a fundamentally different approach by redefining the cable landing station as an active interconnection hub rather than a simple termination site. A critical component of this strategy is ownership and control of the front haul infrastructure. In 2024, NJFX acquired bore pipes from SubCom, allowing the company to directly own and manage the physical conduit between the beach manhole and the facility. By controlling this front haul segment, NJFX eliminates reliance on third-party infrastructure at one of the most sensitive points in the network path. This approach enhances security, increases resiliency, and provides greater operational certainty for subsea system owners and customers deploying critical capacity.

NJFX’s CLS and data center campus sits directly at the point of convergence between subsea systems and terrestrial networks. Rather than pushing traffic inland immediately, global networks can interconnect locally within the same secure facility where the cable lands. Traffic can be exchanged, routed, and distributed without unnecessary transport hops, reducing latency and minimizing dependence on legacy backhaul architectures. Multiple diverse points of entry further strengthen physical and network diversity, while keeping routing decisions close to where traffic enters the United States.

This model has enabled NJFX to support traffic at a scale rarely seen at a cable landing station. Today, more than 250 terabits per second of live traffic transits the NJFX campus, reflecting the shift from legacy architectures to high-capacity, high-density environments. Networks have moved well beyond 10G and 100G deployments. As demand for data-intensive workloads such as generative AI, real-time analytics, high-frequency trading, and cloud-native applications continues to grow, 400G has become the operational baseline. At the same time, active planning is underway across the industry for 800G interfaces and spectrum-based capacity strategies to further maximize fiber utilization and future-proof network investments.

This level of traffic concentration is made possible by combining direct access to four subsea cable systems with a dense, carrier-neutral interconnection ecosystem. NJFX supports more than 35 network operators and connects to 28 terrestrial fiber networks leading to major metro hubs throughout the Northeast and beyond. Traffic entering the facility benefits from four diverse points of entry, enhancing resiliency while maintaining proximity to population centers, cloud regions, and financial markets. By consolidating subsea landing, interconnection, and terrestrial access within a single campus, NJFX enables efficient traffic exchange at scale.

Supporting hundreds of terabits per second of live traffic also requires infrastructure engineered for long-term growth. Expansion at NJFX is reflected not only in increasing port speeds, but in the evolution of the physical environment itself. Higher-density switching and routing platforms drive increased rack power requirements, greater cross-connect density, and the need to scale from single cabinets into private cages and integrated network environments. These changes are planned in parallel with ongoing discussions around 800G optics, spectrum-based capacity planning, and future optical transport upgrades, ensuring that the facility remains aligned with the direction of global network evolution.

As the global subsea network continues to expand, with hundreds of cable systems active or under development worldwide, the question facing operators is no longer simply where capacity lands. The more pressing question is where that capacity can be efficiently exchanged, securely managed, and scaled over time. Most cable landing stations will continue to operate as passive sites, feeding traffic into traditional data centers and exchange points. NJFX represents a different path, one that aligns the landing of subsea capacity with the realities of modern, high-capacity network design.

With new subsea systems coming online and the addition of a 10MW data hall within the NJFX campus, demand for capacity, interconnection, and localized traffic exchange is expected to continue growing. In an era defined by scale, resiliency, and performance, bringing interconnection directly to the cable landing station is no longer an edge case. It is a purpose-built model designed to support the future of global connectivity.

Capacity at the Edge: How Traffic Moves Through NJFX Premium Connectivity Hub Read More »

All Hazard Preparation, Safety, Recovery Training (Cyberattack)

How All-Hazard Safety and Recovery Training Strengthens Our Defense Against Cyberattacks

learn how all-hazard training modules—focused on preparation, safety, and recovery—are equipping teams with the skills and awareness needed to prevent disruptions, protect public safety, and ensure rapid response during digital crises.

Strengthening Our Digital Frontlines: The Importance of Cyber Preparedness, Safety, and Recovery

As Cybersecurity Awareness Month continues, NJFX is underscoring the critical importance of preparedness, safety, and recovery practices when facing cyber threats. Our team has been diligently completing individual cybersecurity training modules, and we are proud to share that we are nearing 100% compliance. This proactive approach reflects our commitment to protecting the vital infrastructure and communities we serve.

Why Cybersecurity Matters More Than Ever

Cyberattacks have evolved in scale, frequency, and sophistication. Organizations supporting digital communication infrastructure—like data centers, subsea cable landing stations, and network interconnection points—are increasingly being targeted. These assets are foundational to everything from global financial transactions to emergency response communications.

In New Jersey, the Communications Sector plays a vital role in national connectivity, linking domestic networks to international subsea routes that carry the world’s data. A disruption in this ecosystem has the potential to impact millions of people and organizations across the region and beyond.

The Impact of Cyberattacks on Critical Infrastructure

When malicious actors launch cyberattacks—whether ransomware, distributed denial of service (DDoS), phishing campaigns, or system intrusions—the consequences can be significant:

  • Service Disruptions & Outages: Interrupting connectivity can halt operations, restrict communication, and impact essential services like hospitals and emergency management.

  • Financial & Operational Losses: A breach can lead to costly recovery efforts, system repairs, and reputational damage.

  • Data Integrity & Security Risks: Unauthorized access can compromise sensitive data, customer information, and mission-critical systems.

  • Cascading Regional or National Impacts: Because networks are interconnected, a cyber incident at one facility can spread, affecting broader infrastructure ecosystems.

This is especially relevant for facilities like cable landing stations and carrier-neutral interconnection hubs, where domestic and global networks converge. An attack at one point of interconnection can trigger far-reaching disruptions.

Preparation, Safety, and Recovery: A Resilient Approach

At NJFX, cybersecurity is not just a compliance requirement—it’s a culture of vigilance. Our approach is built on three key pillars:

1. Preparation

  • Ongoing employee training and awareness programs

  • Updated security protocols aligned with industry standards

  • Regular vulnerability assessments and proactive network monitoring

2. Safety

  • Strong access control measures and 24/7 security operations

  • Physical security integration with digital threat protection

  • Strict procedures for managing and maintaining customer equipment and systems

3. Recovery

  • Comprehensive incident response planning

  • Cross-team coordination to minimize downtime

  • Redundant pathways and diverse connectivity options to maintain resilience even during disruptive events

By reinforcing these measures, we help ensure that the communications infrastructure supporting regional, national, and global networks remains secure and reliable.

All Hazard Preparation, Safety, Recovery Training (Cyberattack) Read More »

Building Standards for AI Infrastructure

Building Standards for AI Infrastructure

At the AI Infra Summit in Santa Clara, leaders from NJFX, CoreSite, OpenAI, Actnano, and Cirrascale examined how liquid cooling, latency, and connectivity will shape the next generation of AI infrastructure. Learn why purpose-built, carrier-neutral data centers are critical as AI enters production mode.

Santa Clara, CA – Artificial intelligence may be advancing at breathtaking speed, but the limiting factor is no longer just compute power. It’s infrastructure. At the AI Infra Summit in Santa Clara, executives from NJFX, CoreSite, OpenAI, Actnano, and Cirrascale tackled the pressing challenges of scaling AI responsibly.

The discussion, moderated by Dave Driggers, CEO and CTO of Cirrascale Cloud Services, brought together:

  • Gil Santaliz, CEO & Founder of NJFX
  • Eric Dela Pena, Director of Sales Engineering at CoreSite
  • Reza Khiabini, Member of Technical Staff at OpenAI
  • Taymur Ahmad, Founder & CEO at Actnano

Together, they examined how colocation providers, new facility design, and industry standards will define the next stage of AI infrastructure.

By 2026, when NVIDIA’s next-generation chips are released, liquid cooling will no longer be optional—it will be the baseline.

“We’re going to need a new level of density in these facilities—mixing and matching workloads, but with hardened infrastructure,” said Dave Driggers of Cirrascale. “Telcos eventually set those standards; the difference is we have to get there much faster than they did.”

Eric Dela Pena of CoreSite emphasized the collective responsibility: “We’re really going to gain adoption on all of this as a community. We need to settle on what is going to be the standard—and how we come together to build data centers capable of supporting the future of AI workloads.”

Inference Shaping Infrastructure

Inference workloads, unlike training, are highly latency-sensitive. To deliver real-time responses, compute must be pushed closer to users and data sources. This shift is giving rise to Inference Optimal Locations (IOLs).

“Every millisecond matters,” said Reza Khiabini of OpenAI. “You can’t ship inference halfway across the country and expect real-time performance. We need infrastructure close to the edge, near the users.”

Gil Santaliz of NJFX tied this directly to connectivity: “Inference is about connectivity and production data. The ecosystem sits in carrier hotels today, but we have to rethink how those facilities can responsibly support AI workloads.”

Carrier hotels have historically been vital for interconnection, but panelists agreed they are ill-suited for liquid-cooled AI at scale.

These multi-story, multi-tenant buildings face four critical challenges:

  • Leak mitigation in shared cooling environments
  • Structural load capacity limits for dense racks
  • Power density requirements beyond design specs
  • Physical and cyber security vulnerabilities

Santaliz used a memorable analogy: “If you own a home, you control everything. But if you live in a condominium, you share centralized systems and must be mindful of your neighbors. That’s the reality of multi-tenant infrastructure.”

Some operators are tethering expansions to existing facilities to buy time. But panelists stressed the limits of this approach.

Taymur Ahmad of Actnano warned of risks that cannot be ignored: “Cooling introduces challenges like condensation and leaks. If you don’t design with protective technologies, you risk outages that no operator wants to face.”

Driggers added: “You can’t build production AI on stopgaps. Tethering may help in the short term, but it’s not the long-term solution.”

The Path Forward: Purpose-Built, Connectivity-Rich Facilities

The future of AI infrastructure lies in purpose-built facilities designed for density, liquid cooling, and direct interconnection.

“We can support three or four unique requests; no one can handle 10 or 20,” said Santaliz. “We start customers at a megawatt and let them grow. It’s a boutique approach—doing an exceptional job for a few, not trying to be everything for everyone.”

Panelists agreed that North America will require next-generation AI facilities in four key regions:

  • Northeast – to serve the main population corridor
  • Southeast – close to fast-growing population hubs
  • Southwest – balancing hyperscale demand and edge growth
  • Northwest – providing resiliency and redundancy

“Liquid cooling should be the standard,” Ahmad added. “But at the edge, we may also need custom approaches. The design has to fit the workload and location.”

AI Entering Production Mode

The panel closed with a clear message: AI is no longer in the experimental stage—it is entering production mode.

“AI has left the lab,” said Driggers. “This is about scaling production workloads, and that means scaling infrastructure in a way that hasn’t been done before.”

Santaliz reinforced the point: “Inference is about connectivity, production data, and working with the masses. That’s why colocation providers matter more than ever.”

The conversation in Santa Clara underscored a turning point: AI is no longer just a software story—it’s an infrastructure story.

Cooling, density, and connectivity will define the winners. And colocation providers—once seen as landlords—are emerging as strategic partners in enabling AI’s future.

As the panel made clear, the future of AI will be written not just in code, but in concrete, steel, fiber, and water.

Building Standards for AI Infrastructure Read More »

The Rise of Neo Clouds: Shaping the Future of AI Infrastructure

The Rise of Neo Clouds

Neo Clouds are transforming digital infrastructure with high-density compute, liquid cooling, and AI-native design. Discover how these specialized providers are challenging hyperscalers and why data centers like NJFX’s 9MW AI-ready hall are critical to supporting the next generation of workloads.

A New Wave in Cloud Infrastructure

The data center industry is entering a new era. For years, hyperscalers dominated the market, offering massive, centralized compute power that fueled global enterprises and cloud-native applications. But now, Neo Clouds are emerging—specialized providers engineered to support the exponential demand for AI, HPC, and ultra-low latency workloads.

Unlike traditional hyperscalers that built scale on broad utility services, Neo Clouds are optimized for density, performance, and agility. And in doing so, they may become the first real competition hyperscalers have seen in over a decade.

How Neo Clouds Redefine Compute Resource Deployment

Here’s how Neo Clouds distinguish themselves in their approach to compute resource deployment:

  • High-Density Compute: Unlike hyperscalers that operate with standard 8–12kW racks, Neo Clouds like Flexential design their data centers for much higher power densities—often 50kW or even up to 200kW per rack in extreme cases.

  • Liquid Cooling: Such density necessitates advanced cooling solutions beyond traditional air cooling. Direct-to-chip and immersion liquid cooling are becoming standard to manage the immense heat output of these systems.

  • Custom Hardware Integration: Neo Clouds integrate specialized hardware like GPUs and TPUs, directly addressing the performance needs of AI and ML applications.

  • AI-First Architecture and Orchestration: Unlike general-purpose hyperscaler environments, Neo Clouds design their infrastructure, networking, and orchestration layers specifically for AI workloads, ensuring superior performance and efficiency.

  • Bare-Metal Access: Leading Neo Clouds like Voltage Park emphasize bare-metal GPU access, removing virtualization overhead and offering better performance and predictability for specialized workloads compared to virtualized hyperscaler models.

Competition or Complement to Hyperscalers?

Hyperscalers are known for scale and ecosystem reach. However, hyperscaler footprints aren’t always optimized for latency-sensitive, high-power workloads. Enterprises looking to train or deploy large models face constraints when pushing beyond 12kW racks in legacy cloud facilities.

Neo Clouds are filling this gap, offering AI-ready colocation and compute clusters that hyperscalers often can’t deliver with the same speed or specialization. While they may not replace hyperscalers outright, Neo Clouds are carving out a new category: specialized competition at the high-performance layer of the cloud stack.

Why This Matters for Data Centers

The rise of Neo Clouds signals a fundamental shift in how data centers need to evolve:

  • Power Density as the New Currency: Where once interconnection and resiliency were the core differentiators, megawatts of GPU-ready power per hall is now the key metric.

  • AI as the Anchor Tenant: Just as hyperscalers reshaped the industry by becoming the anchor tenant of the last decade, AI-native cloud operators could drive the next wave of growth.

  • Strategic Location Matters More: Facilities near subsea cables and financial hubs are especially attractive for Neo Clouds, enabling global connectivity and real-time performance.


Conclusion: The Next Chapter of Cloud Competition

The emergence of Neo Clouds highlights a turning point in digital infrastructure. As enterprises demand compute that is denser, faster, and more adaptable, the market is shifting away from one-size-fits-all hyperscale models.

For data centers, the question is no longer just about space and power—it’s about who can provide the densest racks, the lowest latency, and the most direct connectivity to AI workloads. In this landscape, Neo Clouds are not just disruptors; they’re redefining what the future of cloud looks like.

At NJFX, we’re meeting this demand head-on with a 9MW AI-ready data hall, purpose-built for high-density deployments. By combining subsea and terrestrial interconnection with liquid-cooled infrastructure, NJFX offers the environment Neo Clouds and AI-native workloads require to thrive.

The Rise of Neo Clouds: Shaping the Future of AI Infrastructure Read More »

The Importance of Hurricane Preparedness

Hurricane Preparedness Plan for the Communication Sector

Building Resilient Communications Infrastructure

Extreme weather events like hurricanes pose significant threats to the telecommunications sector, where uninterrupted connectivity is critical for businesses, emergency responders, and communities. A robust preparedness plan ensures that telecom operators can minimize downtime, protect assets, and safeguard public safety.

Purpose and Scope
This guide provides a structured approach for hurricane preparedness in telecommunications, covering risk assessment, infrastructure protection, operational response, and recovery strategies.

Objectives

  • Minimize service interruptions during hurricanes
  • Protect critical infrastructure and data
  • Ensure safety and readiness of staff
  • Maintain communication continuity for stakeholders

Stakeholders Involved
Preparedness requires coordination between network operators, data center managers, subsea and terrestrial fiber providers, government agencies (OEM, FEMA, local police/fire), customers, and the broader community.

I. Preparation Phase

A. Risk Assessment & Planning

  • Identify critical assets (cable landing stations, data centers, towers, subsea systems).
  • Conduct =vulnerability analysis for structural, environmental, and geographical risks.
  • Establish communication dependencies, including PACE (Primary, Alternate, Contingency, Emergency) plans and succession protocols.

B. Infrastructure Protections

  • Fortify facilities with windproofing, flood barriers, and elevated systems.
  • Ensure backup power redundancy with generators, UPS, and fuel reserves.

C. Data and System Backup

  • Schedule regular backups to cloud-based platforms.
  • Validate backup integrity to avoid corrupted or inaccessible data during crisis.

D. Staffing & Training

  • Define roles within the Emergency Action Plan.
  • Conduct hurricane-specific drills.
  • Maintain a communication priority list to streamline decision-making.

E. Communication and Coordination

  • Establish channels with local authorities, utilities, and emergency services.
  • Pre-notify personnel and stakeholders of plans.
  • Coordinate with fiber operators and providers to align response actions.

F. Inventory & Equipment

  • Maintain an updated inventory of spare parts and repair tools.
  • Pre-position critical hardware and portable power sources.

II. Response Procedures

A. Monitoring & Alerts

  • Track weather developments through official channels.
  • Activate internal alerts once hurricane watches/warnings are issued.

B. Activation of Emergency Operations

  • Follow activation protocols for team mobilization and asset reinforcement.
  • Support staff life-safety needs with 72-hour resource reserves.

C. Communication Management

  • Use redundant communication systems (satellite, radio, mesh).
  • Provide real-time updates to customers and stakeholders.

D. Infrastructure Management

  • Secure and shut down non-essential systems.
  • Assign ops teams for rapid-response repairs.

E. Data Integrity & Security

  • Safeguard data accessibility.
  • Monitor for cyber vulnerabilities during outages.

III. Recovery Procedures

A. Damage Assessment

  • Inspect infrastructure post-storm, documenting impacts for insurance and regulatory purposes.
  • Prioritize restoration of critical network pathways.

B. Restoration of Services

  • Coordinate with subsea and terrestrial partners for fast repair.
  • Restore power, cooling, and connectivity in phases.

C. Post-Event Review

  • Conduct debriefings to evaluate response effectiveness.
  • Capture lessons learned and refine plans.

D. Communication & Reporting

  • Provide transparent updates to stakeholders.
  • Share service restoration timelines and resilience improvements.

IV. Continuity Planning

  • Implement alternate routing and failover systems.
  • Establish off-site backup operations in case of primary site compromise.
  • Maintain updated emergency contact lists (Wall PD, FD, NJSP, OEM, FEMA).

Lessons from Other Disasters: Wildfire Preparedness in Telecom

While hurricanes dominate East Coast concerns, wildfires have presented parallel risks to telecom infrastructure. For example, a recent wildfire near the Pine Barrens threatened towers supporting mobile and internet services. As flames advanced, operators rerouted traffic through alternative networks to reduce outages.

Despite these efforts, some communities still experienced temporary blackouts—limiting access to evacuation alerts and emergency notifications. This underscored the need for redundant systems, fireproof infrastructure, and emerging mesh technologies that can maintain connectivity even when physical assets are compromised.

Similar to hurricane planning, wildfire preparedness requires proactive measures: clearing vegetation near facilities, equipping sites with portable power, and ensuring staff safety. Both scenarios emphasize one key truth: telecom resilience is public safety resilience.

Hurricane preparedness in the telecom sector is not optional—it is mission-critical. By investing in robust infrastructure, planning for contingencies, and learning from other disasters like wildfires, operators can safeguard networks that millions rely on for communication, safety, and stability.

Resilient critical infrastructure is the backbone of modern society. As weather patterns grow more unpredictable, preparation ensures continuity when it matters most. See below on how to prepare and stay safe.

The Importance of Hurricane Preparedness Read More »

Nine Years of Fostering the Next Generation at NJFX

Nine Years of Fostering the Next Generation at NJFX

Celebrating National Interns Day

At NJFX, we’ve always believed that building a stronger telecommunications industry means investing in the people who will carry it forward. For the past nine years, nurturing the next generation has been part of our mission by providing students and young professionals the chance to gain real-world experience in operations, security, sales, and marketing.

We have had the privilege of mentoring 10 exceptional interns who have gone on to flourish in their careers. Each has taken the knowledge and opportunities gained at NJFX and applied them to exciting new chapters in the IT, telecom, and enterprise space.

Today, on International Interns Day, we proudly celebrate their journeys:

Sales & Business Development

JP Merkler – Interned under Felix Seda, focusing on sales and business development strategies → Now at Goldman Sachs

Sarah Kurtz – Also a sales/BD intern under Felix, later hired full-time at NJFX as Business Development & Marketing Associate, and eventually became a mentor → Now at Cloudflare

Amanda Kadunce – Mentored by Sarah Kurtz during her internship in sales/BD → Now at QTS

Site Access, Security & Compliance

Spencer Nowak – Focused on accounting and security while helping develop compliance assessment tools with our Site Access team → Currently completing his degree and interning at Orangewood Partners

Tiffany Antonelli – Worked on site security and developed tools to help ensure our facility met high government compliance standards → Now an Intelligence Analyst with the NJ State Police

Michael Beekman – Participated in site and compliance support, with a focus on investigative practices → Now a Senior Anti-Money Laundering Investigator at Standard Chartered

Engineering & Operations

Olivia Braunstien – Served as an engineering intern and later found her passion in brand and technical marketing → Now Marketing Manager at BD

Dylan Braunstien – Operations intern who gained exposure to data center processes and customer handling → Currently interning at Fiserv

Marketing & Strategy

Taylor Khan – Supported by Emily Newman during her marketing internship, worked on digital campaigns and event planning → Now part of Verizon’s professional development program

Alex Sokol – A high school student who interned at NJFX to explore both marketing and operations. He learned firsthand the intricacies of managing a premier interconnection hub → Continuing studies, with a deepened passion for digital infrastructure

Why NJFX Supports Internships and the Next Generation 

Beyond our own program, NJFX has worked to extend this mission to the broader telecom community. Eight years ago, we helped launch the Millennials in Telecom initiative at PTC, recognizing that the industry needed to create more intentional opportunities for young professionals to break in, be heard, and find their place.

What started as an informal gathering has since evolved into the PTC Beyond Committee, an official initiative that gives students and early-career professionals free access to the Pacific Telecommunications Council’s annual conference in Honolulu. This platform allows emerging leaders to meet with senior executives, ask questions, explore cutting-edge topics, and build connections that can shape their futures.

For NJFX, the motivation has always been clear: today’s interns are tomorrow’s innovators, network architects, cybersecurity experts, and decision-makers. By creating a hands-on, meaningful internship experience and amplifying that effort through broader industry platforms, we’re helping to ensure that the future of telecommunications is not only technically strong but also diverse, inclusive, and future-ready.

As we celebrate National Interns Day, we reaffirm our commitment to uplifting the next generation and continuing to be a gateway for future leaders in the world of connectivity.

Nine Years of Fostering the Next Generation at NJFX Read More »

Future‑Ready Middle Mile Powering AI‑Driven Connectivity

Future‑Ready Middle Mile Powering AI‑Driven Connectivity

NJFX’s purpose‑built Middle Mile connects subsea cables, terrestrial networks, and edge AI nodes, delivering low‑latency infrastructure for advanced AI workloads.

The Next Evolution of the Trusted Middle Mile

The Internet has entered a new era. From the work‑from‑home revolution and the explosion of IoT devices to the dramatic rise of generative AI and real‑time analytics, our society is generating and consuming data at unprecedented scale. Video calls and cloud applications have long tested broadband capacity, but today’s AI workloads demand much more: ultra‑low latency, high‑bandwidth “pipelines” that carry massive model weights and inference results between data centers, subsea cables, and end users.

Since 2015, NJFX has embodied the concept of “The Trusted Middle Mile”: a purpose‑built, Tier 3 campus designed from the ground up to be carrier‑neutral, resilient, and future‑ready. Our New Jersey facility serves as the critical junction where multiple subsea cables meet U.S. terrestrial routes, Internet exchanges, global cloud on‑ramps, and content delivery networks. With four live subsea systems, NJFX connects over 30 independent network operators, including industry leaders such as AT&T, Zayo, Lumen, Windstream, Arelion, and Verizon, each leveraging terrestrial and aerial routes to ensure true path diversity.

AI‑Ready Infrastructure at the Edge
Today’s AI models whether powering real‑time language translation, autonomous vehicles, or complex simulations—thrive on speed. NJFX meets this need by hosting edge inference nodes and providing direct, low‑latency connectivity to major cloud providers’ regional PoPs. Our high‑density data halls support up to 10 MW of power, cooling optimized for GPU infrastructure, and turnkey rack builds that get you up and running in days, not months. By placing compute closer to where data lands, we dramatically reduce round‑trip times for AI training and inference, giving you a competitive edge in data‑driven innovation.

Robust physical security, redundant power feeds, and continuous operational oversight ensure your network stays online 24×7×365. Our team works hand‑in‑hand with DHS/CISA and local authorities to monitor threats, coordinate response efforts, and provide customers with real‑time alerts and support. From fiber‑path diversity spanning Denmark to Brazil, to hardened design against environmental hazards, NJFX is engineered for the unexpected.

As organizations across finance, healthcare, media, and beyond lean ever more heavily into AI, the network that underpins innovation must be as intelligent and adaptable as the applications it carries. NJFX remains your trusted middle mile is ready for today’s challenges and built for tomorrow’s breakthroughs.

Future‑Ready Middle Mile Powering AI‑Driven Connectivity Read More »

NJFX Hires a Controller

NJFX Hires a Controller

Brandon Kolczynski joins NJFX as Controller, bringing with him more than eight years of professional accounting experience and a strong foundation in the telecommunications industry.

With a proven track record of managing complex financial systems and streamlining operational processes, Brandon plays a pivotal role in supporting NJFX’s financial health and strategic planning efforts.

In his role, Brandon works directly with Chief Financial Officer Jim Martini, helping to oversee daily financial operations, budgeting, reporting, and long-term forecasting. His goal-oriented mindset and keen attention to detail ensure NJFX remains efficient, compliant, and positioned for continued growth.

Brandon‘s path into finance began with a Bachelor of Science in Finance, which provided him with the technical knowledge and analytical skills needed to thrive in high-paced environments. Beyond the numbers, Brandon brings a strong sense of leadership and discipline to the team—skills sharpened during his time as a Division I collegiate athlete, playing soccer for both the University of Pittsburgh and the University of South Florida.

With a passion for collaboration and continuous improvement, Brandon is already making an impact at NJFX, and we’re proud to have him on board as we continue to scale and evolve our operations.

 

NJFX Hires a Controller Read More »

Hello!

Login to your account

small_c_popup.png

Let's have a chat

Learn how we helped 100 top brands gain success.