Telecom and Networking

Want 5G? It’s going to take an IP anyhaul overhaul | EDN

Want 5G? It’s going to take an IP anyhaul overhaul | EDN http://www.edn.com/electronics-blogs/5g-waves/4458460/Want-5G–It-s-going-to-take-an-IP-anyhaul-overhaul?utm_content=bufferecb1e&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Much of the ongoing discussion around 5G is focused on use cases: wireless broadband to the home, in-vehicle infotainment, immersive event experiences, truck platooning, remote health care, smart cities and smart factories to name a few. Mobile networks and cloud packet core

Who catches the IMSI catchers? Researchers demonstrate Stingray detection kit

https://techcrunch.com/2017/06/02/who-catches-the-imsi-catchers-researchers-demonstrate-stingray-detection-kit/?ncid=rss&utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&utm_content=FaceBook&sr_share=facebook What’s needed is an independent method of identifying IMSI catchers in the wild. That’s what University of Washington researchers Peter Ney and Ian Smith have attempted to create with SeaGlass. “Up until now the use of IMSI-catchers around the world has been shrouded in mystery, and this lack of concrete information is a barrier to

The Many Benefits of HTTP/2 – The Media Temple Blog

http://mediatemple.net/blog/tips/many-benefits-http2/?utm_source=facebook&utm_campaign=blog&utm_medium=paidsocial&utm_term=linkpreview&utm_content=http2 Now there is a budding new alternative to the endless caching and performance supplements. HTTP/2 — a new protocol update for HTTP by IETF (Internet Engineering Task Force).  HTTP/2 is the spiritual successor to HTTP/1 and provides much needed changes in security, speed, and usability. Let’s explore some of the key features and main benefits of implementing

After years of warnings, mobile network hackers exploit SS7 flaws to drain bank accounts • The Register

https://www.theregister.co.uk/2017/05/03/hackers_fire_up_ss7_flaw/ O2-Telefonica in Germany has confirmed to Süddeutsche Zeitung that some of its customers have had their bank accounts drained using a two-stage attack that exploits SS7: Thieves exploited SS7 to intercept two-factor authentication codes sent to online banking customers. Is this beginning of end for use of SMS for two factor authentication? SS7 was known to be

Cell phones to operate underground

Cell phones do not work on tunels and other undeground contructions without help because many meters of earth, stone, concrete and steel to block the RF signals. To make cell phones to work underground, you need to build some sort of structure that allows signals to pass through so you can access your wireless data.

The main differences between internet privacy in the US and the EU

https://www.marketplace.org/2017/04/20/tech/make-me-smart-kai-and-molly/blog-main-differences-between-internet-privacy-us-and-eu European privacy regulations are generally more consumer-focused than U.S. rules. “Who is the focus of these laws? Is it about protecting us, and giving us all the information we need and allowing us to make informed choices?”  “Or is it about allowing Comcast to keep up with Google and Facebook when it comes to

Struggling towards 5G | EDN

http://www.edn.com/electronics-blogs/5g-waves/4458307/The-struggle-to-5G?utm_content=bufferf9a50&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer  5G is developing so fast it’s hard to get a handle on it, whether you’re responsible for building 5G systems or writing about them. Part of the problem is that 5G is not one proposed standard, it’s a growing set of them.  Every new proposal of this sort complicates the ability of standards bodies

Using a supercapacitor for power management and energy storage in IoT

http://www.edn.com/design/power-management/4458294/Using-a-supercapacitor-for-power-management-and-energy-storage-with-a-small-solar-cell–Part-1 The environment has abundant energy but little power. Energy harvesting can tap the environment’s “infinite” source of energy, and avoids the cost of wiring to mains power or replacing of batteries. This article will look at using small solar cells.  Depending on the light level, whether indoors or out, small solar cells may deliver

Encryption and Securing Our Digital Economy

http://www.circleid.com/posts/20170407_encryption_and_securing_our_digital_economy/ Currently, there are 360 million people that take part in cross-border e-commerce. 28% of output in mature economies is digital. The Internet is set to contribute $6.6 trillion a year, or 7.1% of the total GDP in the G20 countries.  And, by 2020, it’s estimated that more than 1 billion users will be added and there will be 30-50