Telecom and Networking

Computer technologies for 2012

ARM processor becomes more and more popular during year 2012. Power and Integration—ARM Making More Inroads into More Designs. It’s about power—low power; almost no power. A huge and burgeoning market is opening for devices that are handheld and mobile, have rich graphics, deliver 32-bit multicore compute power, include Wi-Fi, web and often 4G connectivity,

tcpdump

Packet capture is one of the most fundamental and powerful ways to do network analysis. If you think that tcpdump has been made obsolete by GUI tools like Wireshark, think again. Wireshark is a great application; it’s just not the right tool for the job in every situation. tcpdump uses a “one-off-command” approach that lends

WANem network emulator

There are many cases when need to emulate various networking conditions and scenarios. Usually the most practical way to test the application on different networking conditions is to use some kind of WAN emulator that lets you control the various networking characteristics. WANem is a free WAN emulator suitable for this task. WANem allows the

Ethernet for Vehicles

Ethernet for Vehicles Advances article tells that Ethernet technology in the car (a concept that was once unthinkable for the automotive industry) has been gaining momentum lately. The irony of this sudden trend is that a few years ago, Ethernet wasn’t seen as a solution to any applications in the car (one exception for this

SCADA systems security issues

SCADA systems are used to monitor and control critical installations in oil and gas refineries, water and power distribution plants, manufacturing plants and other industrial facilities. There has been a lot of discussion about malware and security in industrial automation systems after Stuxnet. Widely viewed as the most complex piece of computer malware ever created,

Surveillance system to monitor mobile phones

Met police using surveillance system to monitor mobile phones article from theguardian magazine article tells that civil liberties group raises concerns over The Metropolitan police purchase of technology to track public handsets over a targeted area. Britain’s largest police force is operating covert surveillance technology that can masquerade as a mobile phone network. This allow