INDEX

Analyst Blogs

Gigabit LTE: Creating a Consistent Mobile Broadband Fabric before 5G

Dec. 8, 2017, 10 a.m.
Prayerna Raina, Senior Analyst

LTE-Advanced Pro was ratified in March 2016, making it possible to achieve gigabit download speed theoretically. Gigabit LTE with its three defining technologies of 4X4MIMO, 256QAM, and 3+ carrier aggregation (CA) with a minimum aggregated bandwidth of 60 MHz addresses many of the pressing issues facing mobile operators today. This ...


Read more...

Will Telcos Move to a Network as a Service Model?

Nov. 27, 2017, 9:28 a.m.
Dimitris Mavrakis, Research Director

The deployment of telco networks is a complex, expensive exercise that is governed by strict regulations once licenses are awarded. In the past, voice and data traffic growth has fueled—and justified—nationwide mobile or fixed network deployments, but it is not yet clear what new revenues 5G will bring. Given that ...


Read more...

Apple FaceID Shortcomings Reiterate Need for Multi-Factor Authentication

Nov. 21, 2017, 4 a.m.
Jeff Orr, Research Director

Only a couple of weeks have passed since Apple shipped its first iPhone X smartphone and already hackers have claimed to circumvent the device’s FaceID authentication system. Using a combination of 3D printed mask, color printouts, and a silicon nose mold, the group demonstrated that it could fake the iPhone ...


Read more...

Large Audiences flock to OTT live sports

Nov. 16, 2017, 1:20 p.m.
Sam Rosen, Vice President, Video, OTT and AR/VR

OTT viewing is making a drastic shift from being focused on video-on-demand (VOD) content to live, including large amounts of viewing for flagship events. This puts additional pressure on network technology as well as origin servers. At the same time, the content is destined for the cloud – which is one ...


Read more...

Cryptography in Danger in the Quantum Computing Era

Nov. 13, 2017, 5:33 a.m.
Michela Menting, Research Director

Quantum computing and information theory could therefore create powerful computers, capable of staggering processing speeds and incredibly accurate measurements, as well as enabling the foundation of a highly secure communication infrastructure. However, this same type of power presents dangers as well in that it could just as easily break many ...


Read more...