Archives 2017

Last update on .

LTE-Advanced Pro was ratified in March 2016, making it possible to achieve gigabit download speed theoretically. Gigabit LTE with its three defining technologies of 4X4MIMO, 256QAM, and 3+ carrier aggregation (CA) with a minimum aggregated bandwidth of 60 MHz addresses many of the pressing issues facing mobile operators today. This is because, even though theoretical ...

Last update on .

The deployment of telco networks is a complex, expensive exercise that is governed by strict regulations once licenses are awarded. In the past, voice and data traffic growth has fueled—and justified—nationwide mobile or fixed network deployments, but it is not yet clear what new revenues 5G will bring. Given that managed services and network sharing ...

Last update on .

Only a couple of weeks have passed since Apple shipped its first iPhone X smartphone and already hackers have claimed to circumvent the device’s FaceID authentication system. Using a combination of 3D printed mask, color printouts, and a silicon nose mold, the group demonstrated that it could fake the iPhone X sensor into believing the ...

Last update on .

OTT viewing is making a drastic shift from being focused on video-on-demand (VOD) content to live, including large amounts of viewing for flagship events. This puts additional pressure on network technology as well as origin servers. At the same time, the content is destined for the cloud – which is one reason why cloud-hosted workflows are ...

Last update on .

Quantum computing and information theory could therefore create powerful computers, capable of staggering processing speeds and incredibly accurate measurements, as well as enabling the foundation of a highly secure communication infrastructure. However, this same type of power presents dangers as well in that it could just as easily break many of the cryptographic technologies in ...

Last update on .








 


Question 1: What is blockchain?


At its core, blockchain ...

Last update on .

"We were doing V2V ten years ago, before V2V became cool!"

This is what a CEO of a Wi-Fi mesh vendor told us, whose client portfolio includes 120 mines across the world.

That's right, V2V, or vehicle-to-vehicle communications, one of the hottest use cases in 5G, has existed in mines for decades. We recently ...

Last update on .

The rapid spread of the Petya ransomware is unfortunate yet unsurprising. The WannaCry attack should have been a wake-up call for organizations worldwide of the ease with which malicious actors are profiting from increased connectivity and shoddy cybersecurity. Instead, it provided a valuable case study to cybercriminals about the widespread damage even a mediocre ransomware ...

Last update on .

Phishing attacks continue to be one of the most popular methods of illegitimately obtaining funds, identities, and credentials.  Social engineering, at its best, can entice users to pay over large sums of money, and provide access to private and confidential data that is normally locked down.   The activity has evolved significantly over the years, and ...

Last update on .

Zombie computers, botnets, DDOS, DNS attacks, ransomware - all can be fueled by hordes of insecure devices and malware-infested systems. Devices that have been infected with a specific type of malware which allows stealing of personal data, controlling critical functions, has keylogger and remote access capabilities is usually refer to as a “zombie”. Controlled by fraudsters ...

Monthly archives

Previous year

2016

Next year

2018