Category Archives HSE and CE

On December 9, 2021, a highest possible-severity vulnerability was discovered, and the entire security industry is racing to fix this issue. Read about details of the impact and how we can help users protect against this latest top-rated vulnerability. This issue named Log4j vulnerability (also known as “Log4Shell”) is tracked by CVE-2021-44228 on December 10. […]

5G is introducing tight integration with satellites to expand high-speed coverage into hard-to-reach areas and support maritime applications. This presents a whole new set of challenges for satellite transceiver performance. Next-gen network deployments are ramping up around the world, but there is more to 5G than land-based New Radios and the new Packet Core. 5G […]

Every network and application brings unique characteristics and vulnerability to network impairments. Having a deep understanding of how apps behave in a range of expected scenarios is a critical step in assuring performance. Read how pre-deployment testing and verification will help relieve doubts and reveal the unknown. A perfect storm of tech readiness, big data […]

Speed and security requirements now go hand in hand. Can your tools and testbeds keep up? The pace of tech advancement has officially reached breakneck speeds. 5G, IoT, SD-WAN, SASE and 800 Gigabit Ethernet are just a few of the technologies ushering in not just new possibilities, but new demands. Standards bodies are racing to […]

The demand for data is growing exponentially and the datacenters need to keep pace. RoCEv2 has proven its usefulness over TCP/IP by providing the lowest latency by far in a legacy Ethernet datacenter. Optimization will be key to achieving the best results in large scale deployments. In today’s world, a speedy transfer of data is […]

A global movement toward 800G has begun as operators and network vendors position to address new data demands. Read about how early test solutions are meeting an important need but must flexibly evolve with standards and overcome early complexity up and down the network stack. Though 400 Gigabit Ethernet (400G) is still working its way […]

By disguising the exploits at the point of delivery, malicious attackers can avoid detection, making security platforms and policies ineffective. Stay one step ahead of hackers with CyberFlood and CyberThreat Assessment. Malicious attackers are not necessarily all experts in malware manipulation, PowerShell, or other tools trying to constantly come up with new and innovative ways […]

Open Radio Access Network (O-RAN) is being adopted by service providers and equipment manufacturers to reduce infrastructure deployment costs and to lower the barrier of integrating innovative product developments. Read about the advantages and challenges emerging in that process, and how testing helps speed up O-RAN deployment. In O-RAN, the distributed unit (DU) is connected […]

As organizations seek to grow their business, the information they have access to grows as well. Meanwhile, increasing demands around data security put even more importance on having a proactive security solution in place. Organizations are striving to achieve revenue increases, accelerate digital transformations, and comply with regulatory mandates – all while keeping customer loyalties […]

Close