Top

LATEST PUBLICATIONS



Kagan: Is Cox getting ready to re-enter mobile wireless?

August 14, 2020

Category: Wireless

Rumor is Cox, the cable television company, may be getting ready to re-enter the wireless marketplace. Let’s take a look at whether they will, and if they do, when and what kind of impact it will have on their company […]


T-Mobile US CEO: On 5G, we’re ‘miles ahead’ of AT&T and Verizon

August 7, 2020

Category: Wireless

T-Mobile US CEO Mike Sievert and President of Technology Neville Ray, discussing the operator’s second quarter financial results, touted the expansion of 600 MHz-based 5G coverage with the recent activation of a standalone core and provided an update of the […]


Nokia, China Unicom Complete 5G Standalone Call on Live Network

July 31, 2020

Category: Wireless

Nokia on Thursday announced that it has successfully completed its first 5G standalone (SA) call on a live network with China Unicom, and is expected to achieve full deployment of numerous software solutions with the operator several weeks ahead of […]


Monitoring&Analysis, Security

4 best practices to avoid vulnerabilities in open-source code

August 13, 2020

Via: CSO

This year presented even more challenges for ensuring the integrity and security of open-source ecosystems. Open source has been the greatest boon to developers in that virtually anyone can use and customize it, typically at no cost, and contribute to […]


Monitoring&Analysis, Security

5 security tools to protect your small business data

August 12, 2020

Via: Cisco Blog

Businesses generate data—a lot of it—and the security of that data can have significant ramifications across entire organizations. While enterprise companies have IT departments dedicated to monitoring their cybersecurity, small businesses rarely have the same luxury. Between running the business, […]


Monitoring&Analysis, Security

Is your internet service provider protecting you online?

August 12, 2020

Via: Cisco Blog

Security is more critical today than it has ever been. We are constantly bombarded with buzzwords and acronyms. You hear cyber this and that, malware, SIG, DDOS, MFA, the list goes on… They are all very important, but we rarely […]