It’s official: the DDoS attack on Dyn in October was not just huge but a record breaker, earning the unenviable badge of world’s largest Distributed Denial of Service hack. Scott Hilton, Executive Vice President of Products at Dyn, placed the number of infected IoT devices at the source of the attack at 100,000, with peaks […]
Category Archives Uncategorized
With more than 10 standards already being proposed for low-power applications related to the Internet of Things, it seems reasonable to ask why we might need another one. Yet NarrowBand IoT (NB-IoT), which forms part of the LTE-Advanced Pro (3GPP Release 13) standard that was finalised in June 2016, is perhaps the most eagerly-anticipated new […]
This week at ISE Expo in San Antonio, Viavi is showcasing a variety of new technologies, including G.fast, FTTx, and VNF. Learn how to ramp up these new technologies with Viavi’s award-winning solutions covering broadband to the home, business services, and virtualized test. Stop by our booth #343 to learn more about: Broadband to the […]
In this Olympic year, the motto Citius, Altius, Fortius (Latin for Faster, Higher, Stronger) seems very relevant to where we are with Ethernet networking. We need faster bandwidth, higher levels of service and stronger performance to push around all those videos of cats—as well as the more serious (and less cute) business traffic. Approximately every […]
4G network operators are keen to implement VoLTE in order to be able to deliver a high quality voice experience to their subscribers, and to reduce their dependence on fall-back to 3G technology for voice calls. At the same time they want to keep costs down by carrying voice traffic over all-IP networks, and are […]
Security Assertion Markup Language (SAML) solutions have the potential to greatly improve the overall security of an enterprise’s data, by enhancing the security which an employee gains access to the data and/or a service. We can see today, that a vast majority of enterprises enable their employees with tools or services which are both internal […]
Within three years, experts predict that more than 86% of all workloads will be processed in the cloud. Cloud workloads will more than triple, with workload density (workload per physical server) increasing from 5.1 to 8.4. That’s a lot of important services moving into and growing within the cloud. It is expected that customer expectations […]
We all know that data traffic volumes are increasing exponentially, while at the same time user expectations of quality of experience are higher than ever. With network operators now frequently bundling in subscriptions to audio- or video-streaming services with their premium data packages, it is becoming ever more difficult to predict the volume and type […]
The Evolved Packet Core (EPC) is the IP based core network defined by 3GPP for use by LTE and other access technologies. It provides mobile core functionality that in previous mobile generations like 3G, has been realized through two separate subdomains which includes circuit-switched for voice and packet-switched for data. The goal of EPC provides […]
The volume of security attacks and vulnerabilities plaguing networks only continue to grow. Organizations are rapidly continuing to add even more security layers and resources only to recognize that attacks are continuing to occur at a tremendous rate. Why? Cybercriminals and hacktivists continue to become even more organized and sophisticated, shifting their tactics to evade […]