5G a “Special Generation” – but in Good Time
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cisco SCA BB Protocol Reference Guide
Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. -
CCIA Comments in ITU CWG-Internet OTT Open Consultation.Pdf
CCIA Response to the Open Consultation of the ITU Council Working Group on International Internet-related Public Policy Issues (CWG-Internet) on the “Public Policy considerations for OTTs” Summary. The Computer & Communications Industry Association welcomes this opportunity to present the views of the tech sector to the ITU’s Open Consultation of the CWG-Internet on the “Public Policy considerations for OTTs”.1 CCIA acknowledges the ITU’s expertise in the areas of international, technical standards development and spectrum coordination and its ambition to help improve access to ICTs to underserved communities worldwide. We remain supporters of the ITU’s important work within its current mandate and remit; however, we strongly oppose expanding the ITU’s work program to include Internet and content-related issues and Internet-enabled applications that are well beyond its mandate and core competencies. Furthermore, such an expansion would regrettably divert the ITU’s resources away from its globally-recognized core competencies. The Internet is an unparalleled engine of economic growth enabling commerce, social development and freedom of expression. Recent research notes the vast economic and societal benefits from Rich Interaction Applications (RIAs), a term that refers to applications that facilitate “rich interaction” such as photo/video sharing, money transferring, in-app gaming, location sharing, translation, and chat among individuals, groups and enterprises.2 Global GDP has increased US$5.6 trillion for every ten percent increase in the usage of RIAs across 164 countries over 16 years (2000 to 2015).3 However, these economic and societal benefits are at risk if RIAs are subjected to sweeping regulations. -
SD & Microsd MEMORY CARDS
SD & microSD MEMORY CARDS - THE WORLD’S FIRST CHOICE IN MEMORY CARDS - 20 YEARS OF INNOVATION SD Association launched January 2000 to lead the industry SAN RAMON, Calif. – Jan. 21, 2020 – The SD Association (SDA) is celebrating its 20th Anniversary after launching 20 years ago with a mission to reinvent the memory card and make life easier for consumers and businesses everywhere. Throughout the years, SD memory cards evolved, expanded capabilities and became the number one card of choice. Today, these cards play a critical role in a variety of devices and uses unimagined 20 years ago. The trusted family of SD memory cards give consumers and business users a choice, increase the usefulness, value and longevity of numerous consumer electronics by offering unprecedented portability, upgradeability and interoperability. SD memory cards have become the de facto storage device for billions of products in this mobility era when more storage is required. By 2023 and beyond, enterprises, machines, industries, consumers, science, and more will be generating 103 zettabytes per year, according to IDC. Data generated by consumers and businesses, whether it is from smartphones, tablets, laptops, drones, surveillance cameras, or automobiles, rely on SD memory cards to keep their music, movies, TV shows, games and photos safe and always accessible. Twenty years ago, the memory card marketplace was a confusing mix of about a half- dozen, mostly proprietary card options incompatible with each other and lacked interoperability across different devices. SD was created to become a technology standard to meet growing consumer electronic demand and continue to foster a robust ecosystem for collaborations and growth among all device manufacturers. -
The Past, Present, and Future of SD Memory Cards
The Past, Present, and Future of SD Memory Cards Douglas Wong Toshiba America Electronic Components, Inc. Flash Memory Summit 2011 Santa Clara, CA 1 Early Flash Memory Cards in the 90s PCMCIA ATA Card CompactFlash Miniature Card SmartMedia (aka SSFDC: solid state floppy disk card) 2011/8/8 2 SD Card Announcement MATSUSHITA ELECTRIC, SANDISK AND TOSHIBA AGREE TO JOIN FORCES TO DEVELOP AND PROMOTE NEXT GENERATION SECURE MEMORY CARD SD (Secure Digital) Memory Card Expected To Unleash Wave Of New Digital AV (Audio/Video) Consumer Products And Enable Internet And Wireless E-Commerce. REDWOOD CITY, CA, (Aug. 25, 1999) - Matsushita Electric Industrial Co., Ltd. (NYSE:MC), best known by its Panasonic brand name, SanDisk Corporation (NASDAQ:SNDK) and Toshiba Corporation have reached an agreement on comprehensive collaboration to jointly develop, specify and widely promote a next generation secure memory card. The announcement was made today at joint press conferences in Tokyo, Japan, Osaka, Japan and Redwood City, CA. … Powerful security and copy protection (SDMI compliant) …The security level has been designed to comply with both current and future SDMI (Secure Digital Music Initiative) portable device requirements. Sampling of the new SD Memory Card will begin in the first quarter of 2000. Production shipments are expected to commence in the second quarter of 2000. It is expected that application products that use the new card will be available in the first half of next year. 2011/8/8 3 SD Card Security Elements 2011/8/8 4 SD Association Note: SD, microSD, SDHC, microSDHC, SDXC, microSDXC 2011/8/8 5 and smartSD Logos are trademarks of SD-3C, LLC SD Family Roadmap 2011/8/8 6 SD Standard Roadmap Basic Spec. -
Android OS Security: Risks and Limitations a Practical Evaluation
FRAUNHOFER RESEARCH INSTITUTION FOR APPLIED AND INTEGRATED SECURITY ANDROID OS SECURITY: RISKS AND LIMITATIONS A PRACTICAL EVALUATION RAFAEL FEDLER, CHRISTIAN BANSE, CHRISTOPH KRAUSS, AND VOLKER FUSENIG 5/2012 Android OS Security: Risks and Limitations A Practical Evaluation Version 1.0 Rafael Fedler, Christian Banse, Christoph Krauß, and Volker Fusenig Contact: [email protected] AISEC Technical Reports AISEC-TR-2012-001 May 2012 Fraunhofer Research Institution AISEC Parkring 4 85748 Garching Abstract The number of Android-based smartphones is growing rapidly. They are increas- ingly used for security-critical private and business applications, such as online banking or to access corporate networks. This makes them a very valuable tar- get for an adversary. Up to date, significant or large-scale attacks have failed, but attacks are becoming more sophisticated and successful. Thus, security is of paramount importance for both private and corporate users. In this paper, we give an overview of the current state of the art of Android security and present our extensible automated exploit execution framework. First, we provide a sum- mary of the Android platform, current attack techniques, and publicly known exploits. Then, we introduce our extensible exploit execution framework which is capable of performing automated vulnerability tests of Android smartphones. It incorporates currently known exploits, but can be easily extended to integrate future exploits. Finally, we discuss how malware can propagate to Android smart- phones today and in the future, and which possible threats arise. For example, device-to-device infections are possible if physical access is given. NES Research Department at Fraunhofer AISEC The Fraunhofer Research Institution for Applied and Integrated Security AISEC1 is one leading expert for applied IT security and develops solutions for immediate use, tailored to the customer’s needs. -
Weekly Wireless Report WEEK ENDING August 8, 2014
Weekly Wireless Report WEEK ENDING August 8, 2014 INSIDE THIS ISSUE: This Week’s Stories THIS WEEK’S STORIES Samsung, Apple Agree To Drop Lawsuits Outside U.S. Samsung, Apple Agree To August 7, 2014 Drop Lawsuits Outside U.S. Samsung and Apple Inc. have agreed to end all patent lawsuits between each other outside the U.S. in Sprint And T-Mobile Shares a step back from three years of legal hostilities between the world's two largest smartphone makers. Plunge After Reportedly However, Samsung Electronics Co. said Wednesday that it and Apple will continue to pursue existing Abandoning Merger Plans cases in U.S. courts. The two companies did not strike any cross-licensing deal. PRODUCTS & SERVICES "Samsung and Apple have agreed to drop all litigation between the two companies outside the United States," the South Korean company said in a statement. "This agreement does not involve any licensing Blu Debuts $89 Unlocked, arrangements, and the companies are continuing to pursue the existing cases in U.S. courts." Spec'ed Out Android Phones The announcement is a significant lessening of corporate hostilities after years of bitter patent disputes Lenovo's New Flagship over the intellectual property rights for mobile Relevant Products/Services designs and technology. The Features Quad HD Screen, legal fights spanned about a dozen countries in Asia, North America and Europe. Metal Body and Huge Battery Lawsuits and other legal actions by Samsung and Apple will come to an end in countries including EMERGING TECHNOLOGY Germany, England, France, Spain, Italy, the Netherlands, South Korea, Japan and Australia. -
Privacy and Data Protection in Mobile Applications a Study on the App Development Ecosystem and the Technical Implementation of GDPR
Privacy and data protection in mobile applications A study on the app development ecosystem and the technical implementation of GDPR NOVEMBER 2017 www.enisa.europa.eu European Union Agency For Network and Information Security Privacy and data protection in mobile applications November 2017 About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and EU citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact For queries in relation to this paper, please use [email protected] For media enquires about this paper, please use [email protected]. Legal notice Notice must be taken that this publication represents the views and interpretations of ENISA, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the Regulation (EU) No 526/2013. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. -
Integrating Wi-Fi and Femtocells a Feasibility Study Based on a Techno Economic Comparison of the Two Technologies
Integrating Wi-Fi and Femtocells A feasibility study based on a techno economic comparison of the two technologies RAZVAN POPESCU Master of Science Thesis Stockholm, Sweden 2013 Integrating Wi-Fi and Femtocells A feasibility study based on a techno economic comparison of the two technologies Student Razvan Popescu Supervisor Ashraf Awadelakrim Widaa Ahmed Examiner Jan I Markendahl Wireless@KTH School of Information and Communication Technology, KTH-Royal Institute of Technology, Stockholm, Sweden June 2013 Abstract At the end of 2009 mobile industry reached an inevitable milestone; the aggregated mobile data traffic exceeded voice traffic in the mobile networks. Starting with this point, data consumption has been continuously increasing and there are no signs that this behaviour will change in the future. For this reason mobile operators face nowadays a new paradox: they have to invest massively in their networks in order to sustain the increasing traffic while revenues are not expected to rise. This means that in order to survive, operators have to add extra capacity in a cost-efficient way. Using indoor solutions and mobile data offloading has been considered one right approach for solving this issue. While indoor solutions like Distributed Antenna Systems and repeaters have been used in the mobile networks for some time now, data offloading represents a relatively newcomer in the mobile industry. Using this concept, data traffic generated by mobile devices is moved towards alternative networks releasing the congestion in the operators’ macrocell layers. Among indoor solutions, two technologies stepped forward, Wi-Fi and Femtocells. This MSc thesis studies these two technologies, making a techno- economic comparison between them with respect on QoS level, interference, security and capacity-cost ratio. -
A Highly Reliable Non-Volatile File System for Small Satellites
University of Kentucky UKnowledge University of Kentucky Master's Theses Graduate School 2008 A HIGHLY RELIABLE NON-VOLATILE FILE SYSTEM FOR SMALL SATELLITES Rama Krishna Nimmagadda University of Kentucky, [email protected] Right click to open a feedback form in a new tab to let us know how this document benefits ou.y Recommended Citation Nimmagadda, Rama Krishna, "A HIGHLY RELIABLE NON-VOLATILE FILE SYSTEM FOR SMALL SATELLITES" (2008). University of Kentucky Master's Theses. 571. https://uknowledge.uky.edu/gradschool_theses/571 This Thesis is brought to you for free and open access by the Graduate School at UKnowledge. It has been accepted for inclusion in University of Kentucky Master's Theses by an authorized administrator of UKnowledge. For more information, please contact [email protected]. ABSTRACT OF THESIS A HIGHLY RELIABLE NON-VOLATILE FILE SYSTEM FOR SMALL SATELLITES Recent Advancements in Solid State Memories have resulted in packing several Giga Bytes (GB) of memory into tiny postage stamp size Memory Cards. Of late, Secure Digital (SD) cards have become a de-facto standard for all portable handheld devices. They have found growing presence in almost all embedded applications, where huge volumes of data need to be handled and stored. For the very same reason SD cards are being widely used in space applications also. Using these SD Cards in space applications requires robust radiation hardened SD cards and Highly Reliable Fault Tolerant File Systems to handle them. The present work is focused on developing a Highly Reliable Fault Tolerant SD card based FAT16 File System for space applications. -
C:\Documents and Settings\Sally Springett\My Documents\Oct 13
Alternative Streaming Video Sources by Ira Wilsker sn’t rapidly evolving technology wonderful? While we can still watch a handful of free TV channels over the air with a simple antenna, relatively few people still do. Stores that rent DVDs still exist in relatively Ismall numbers compared to just a few years ago, and VHS rentals have just about gone the way of the dinosaur. There are still thousands of limited selection kiosk type vending machine video rental boxes, typically adjacent to supermarkets, convenience stores, and fast food restaurants, but they still require time The Rochester Computer Society, Inc. Monitor / October 2013 1 and mileage to rent and return videos. Most cable and satellite TV providers offer some form of video streaming on demand at varying prices, but they are now facing significant competition from alternative streaming video services that send TV and movies over the internet directly to the consumer. On a recent visit to see my grandkids in Georgia, my daughter had full length movies from Netflix streaming on her internet connected flat screen TV in her living room; my three year old granddaughter had an inexpensive Android tablet connected to the home Wi-Fi, and expertly manipulated the screen selecting movies and cartoons on the child-safe “Kids Netflix.” For the few who may be totally unaware, Netflix (netflix.com) is currently the industry leader in streaming movies and TV to computers, smart devices (phones and tablets), TVs, and other network connected devices. According to the Netflix website, “For only $7.99 a month, you get unlimited movies and TV episodes instantly over the Internet to your TV or computer. -
7020-02 International Trade Commission
This document is scheduled to be published in the Federal Register on 10/01/2019 and available online at https://federalregister.gov/d/2019-21300, and on govinfo.gov 7020-02 INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-1176] Certain Semiconductor Devices, Products Containing the Same, and Components Thereof (I); Institution of Investigation AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that a complaint was filed with the U.S. International Trade Commission on August 26, 2019, under section 337 of the Tariff Act of 1930, as amended, on behalf of Globalfoundries U.S. Inc. of Santa Clara, California. A supplement to the complaint was filed on September 13, 2019. The complaint, as supplemented, alleges violations of section 337 based upon the importation into the United States, the sale for importation, and the sale within the United States after importation of certain semiconductor devices, products containing the same, and components thereof by reason of infringement of certain claims of U.S. Patent No. 8,912,603 (“the ’603 patent”); U.S. Patent No. 7,750,418 (“the ’418 patent”); and U.S. Patent No. 8,936,986 (“the ’986 patent”). The complaint further alleges that an industry in the United States exists as required by the applicable Federal Statute. The complainant requests that the Commission institute an investigation and, after the investigation, issue a limited exclusion order and cease and desist orders. ADDRESSES: The complaint, except for any confidential information contained therein, is available for inspection during official business hours (8:45 a.m. to 5:15 p.m.) in the Office of the Secretary, U.S. -
A Techno-Economic Comparison Between Outdoor Macro-Cellular and Indoor Offloading Solutions
A techno-economic comparison between outdoor macro-cellular and indoor offloading solutions FEIDIAS MOULIANITAKIS Master's Degree Project Stockholm, Sweden August 2015 TRITA-ICT-EX-2015:224 A techno-economic comparison between outdoor macro-cellular and indoor offloading solutions Feidias Moulianitakis 2015-08-31 Master’s Thesis Examiner Academic adviser Prof. Jan Markendahl Ashraf A. Widaa Ahmed School of Information and Communication Technology (ICT) KTH Royal Institute of Technology Stockholm, Sweden Abstract Mobile penetration rates have already exceeded 100% in many countries. Nowadays, mobile phones are part of our daily lives not only for voice or short text messages but for a plethora of multimedia services they provide via their internet connection. Thus, mobile broadband has become the main driver for the evolution of mobile networks and it is estimated that until 2018 the mobile broadband traffic will exceed the level of 15 exabytes. This estimation is a threat to the current mobile networks which have to significantly improve their capacity performance. Furthermore, another important aspect is the fact that 80% of the mobile broadband demand comes from indoor environments which add to the signal propagation the burden of building penetration loss. Keeping these facts in mind, there are many potential solutions that can solve the problem of the increasing indoor mobile broadband demand. In general, there are two approaches; improve the existing macro-cellular networks by for example enhancing them with carrier aggregation or enter the buildings and deploy small cell solutions such as femtocells or WiFi APs. Both the academia and the industry have already shown interest in these two approaches demonstrating the importance of the problem.