Telecom and Networking

Taking Down the Internet Has Never Been Easier

http://www.darkreading.com/vulnerabilities—threats/taking-down-the-internet-has-never-been-easier/a/d-id/1329580 Is there a reason why the Internet is so vulnerable? Actually, there are many, and taking steps to remain protected is crucial. On October 29, 1969, two computers linked via telephone exchanged a couple of letters, then crashed.  Fast-forward 48 years, where everything — including the kitchen sink, in the case of smart kitchens — is

IoT: The Interference of Things | EDN

http://www.edn.com/electronics-blogs/the-emc-blog/4458714/IoT–The-Interference-of-Things?utm_content=bufferae2f7&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer The writer of this article declares that IoT stands for “Interference of Things.” Anything else you may have heard is just marketing hype. Relatively few connected gadgets will use wireline communications, the bulk of these devices will connect wirelessly over Bluetooth, Wi-Fi, cellular or something else. Some IoT devices will be designed to limit

Axell Wireless 3009 tear down

http://cobhamwireless.com/product/900mhz/d-sbr-3009/axel-wireless-products-014-3/ Such a repeater has the following main features: Axell 3009D - 900 MHz Software Defined Repeater, 25 dBm composite output power, 82 dB Gain, 12 sub-bands, individual gain and ALC, bandwidth settable by software IP65 rated enclosure. Connectors Inside view

Edge computing could push the cloud to the fringe | TechCrunch

https://techcrunch.com/2017/08/03/edge-computing-could-push-the-cloud-to-the-fringe/?utm_source=tcfbpage&sr_share=facebook I can believe in this vision! Edge computing could push the cloud to the fringe Peter Levine believes that cloud computing is soon going to take a back seat to edge computing — and we will very quickly see the majority of processing taking place at the device level. As crazy as that sounds — and

Fiber optic testing updates

Few days ago I read The remarkable evolution of modern fiber-optic connector inspection probes article tells about the current state of fiber inspection. Especially with multifiber connectors such as MPO, MT, and MXC microscopic connector endface dirt and debris cause light reflections and attenuation – the enemies of optimal optical signal transmission. Thankfully there now

Low Energy: Mesh Bluetooth Technology

https://www.bluetooth.com/what-is-bluetooth-technology/how-it-works/le-mesh Bluetooth® Low Energy (LE) enables short-burst wireless connections and supports multiple network topologies, including a mesh topology for establishing many-to-many (m:m) device communications. New control and automation systems, from lighting to heating/cooling to security, are about to make homes and offices a lot smarter. Bluetooth mesh networking supports these smart buildings, enabling tens, hundreds

Probing Ethernet cable with an oscilloscope

This article talks about measuring 10 Mbit/s (10Base-T) and 100 Mbit/s (100Base-TX) twisted pair Ethernet signals. Those standards use two wire pairs for the communications and use differential signaling. Differential signaling is a method for electrically transmitting information using two complementary signals. The technique sends the same electrical signal as a differential pair of signals,

A Photon Has Been Sent To Space Using Quantum Teleportation | IFLScience

http://www.iflscience.com/physics/a-photon-has-been-sent-to-space-using-quantum-teleportation/ Last month, Chinese researchers showed that quantum communication between Earth and space is possible, and now they have used the tech to send a photon to space using quantum teleportation. As this research shows, to create a truly global network for quantum communication, we will need quantum satellites.

The internet is actually controlled by 14 people who hold 7 secret keys | IFLScience

http://www.iflscience.com/technology/the-internet-is-actually-controlled-by-14-people-who-hold-7-secret-keys/ This sounds like something out of a Dan Brown book, but it isn’t: The whole internet is controlled by seven actual, physical keys. ICANN maps the numbers (easier for computers to use) with words (easier for humans to use). If someone were to gain control of ICANN’s database, that person would control the internet.  The physical

Researchers train drones to use Wi-Fi to look through walls | TechCrunch

https://techcrunch.com/2017/06/19/researchers-train-drones-to-use-wi-fi-to-look-through-walls/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook This is quite interesting -or frightening – WiFi radar application. A new system by University of California, Santa Barbara researchers Yasamin Mostofi and Chitra R. Karanam uses two drones, a massive Wi-Fi antenna, and a little interpolation to literally see through solid walls. One drone blasts Wi-Fi through the structure and another picks up the signal.