Top

LATEST PUBLICATIONS



802.11ax: The Sixth Generation of Wi-Fi

May 25, 2018

Category: Wireless

Wireless has evolved dramatically over the last 15 years. The way that Wi-Fi is used in our everyday life today could not be envisioned at the turn of the century. The explosion of personal devices, IoT and the applications that […]


AT&T, Ericsson, Intel to deliver 5G for US Open

May 17, 2018

Category: Wireless

5G goes to the seventh hole of U.S. Open in a collaboration among FOX Sports, AT&T, Ericsson and Intel. Two FOX Sports cameras will transmit 4K HDR images over a 5G network from the seventh hole at the U.S. Open […]


How We Use Fog Computing: Vertical Markets, Use Cases, and Applications

May 11, 2018

Category: Software, Wireless

As the marketplace ponders how best to incorporate fog computing into the Internet of Things (IoT), one of the most important challenges we face is figuring out exactly how fog will be used. Studying potential use cases is a great […]


Monitoring&Analysis, Security

The 5 best malware metrics you can generate

May 22, 2018

Via: CSO

A big problem in the computer security world is that practitioners aren’t skeptical enough, don’t question purported authority statements, and often don’t ask the right questions. It’s a theme I see over and over, and it leads defenders to enacting […]


Analysis, Monitoring&Analysis

IDC analyst Part 2: How to make multi-cloud work for government

May 21, 2018

Via: Cisco Blog

Through her work at IDC, Adelaide drives better understanding of the full scope of efforts needed for digital transformation. This includes focusing on innovative technologies like Big Data, AI, cognitive, and cloud in the context of government. Her research includes […]


Monitoring&Analysis, Security

Cybercriminals impersonate popular file sharing services to take over email accounts

May 21, 2018

Via: CSO

The chances of you opening, clicking or downloading a document sent from a colleague or friend are much higher than acting on an email from someone you don’t know. Cybercriminals know this well, which is why they are sending attacks […]