Posts Tagged ‘technology’

Record-breaking 1Tbps Speed achieved Over 5G Mobile Connection – Hacker News

Thursday, February 26th, 2015

New Generations usually bring new base technologies, more network capacity for more data per user, and high speed Internet service, for which Internet service providers usually advertise. However, it is believed that the fifth generation (5G Technology) of mobile network will be beyond our thoughts.1TBPS OVER 5GSecurity researchers from the University of Surrey have just achieved Record-Breaking data speeds during a recent test of 5G wireless data connections, achieving an incredible One Terabit per second (1Tbps) speed – many thousands of times faster than the existing 4G connections.After 4G, 5G is the next generation of mobile communication technology that aims at offering far greater capacity and be faster, more energy-efficient and more cost-effective than anything that has seen before. The boffins say 5G will be different – very different.The 5G test was conducted at the university’s 5G Innovation Centre (5GIC), which was founded by a host of telecoms industry partners including Huawei, Fujitsu, Samsung, Vodafone, EE, Aircom, BT, Telefonica, Aeroflex, BBC and Rohde & Schwarz.

via Record-breaking 1Tbps Speed achieved Over 5G Mobile Connection – Hacker News.

Google and Microsoft step in to oppose Marriott Hotels’ Wi-Fi blocking petition | The Verge

Wednesday, December 24th, 2014

Marriot Hotels
A petition to grant hoteliers the right to block personal Wi-Fi on their premises is being met with staunch opposition from the biggest technology companies. Google and Microsoft are among those who have filed objections, noting the illegality of any devices capable of interfering with radio signals.

Marriott has been fined for blocking wi-fi connections before

Recode writes that hotel company Marriott International and the American Hospitality & Lodging Association had petitioned the FCC to allow hotel operators to utilize equipment to manage their networks, regardless of whether it may result “in interference with or cause interference to” devices used by guests. This followed a $600,000 settlement case in October, when it was discovered that the employees of Marriott’s Gaylord Opryland Hotel & Convention Center were using a jammer to block off internet access.

Microsoft laid out its arguments against the petition in the filing, stating that a Wi-Fi hotspot set up by a hotel guest is authorized to operate in the unlicensed spectrum, and pointing out that “wilfully excluding these other authorized devices from using that unlicensed spectrum, under the guise of mitigating so-called threats to the reliability (performance) of an operator’s own network, violates Section 333,” which bars “wilful or malicious interference” to radio signals.” The company also pointed out that by restricting the ability to set up their own connections, Marriott would be forcing the customer to pay to access the hotel’s own Wi-Fi, having already paid their mobile operator for the ability to set up a hotspot anywhere.

The hotel chain had argued that it wasn’t breaking the law, but was protecting its guests from “rogue wireless hotspots that can cause degraded service, insidious cyber attacks and identity theft.” But Marriott’s arguments are weak, as there are several examples that show guests are far safer jumping onto their own personal Wi-Fi hotspots than they are connecting to a potentially compromised hotel Wi-Fi network. In November, for example, Kaspersky Labs discovered a group of hackers targeting high-profile business executives who were working from luxury hotels.

via Google and Microsoft step in to oppose Marriott Hotels’ Wi-Fi blocking petition | The Verge.

Fear and Loathing as Telecom Policy | Jeff Pulver

Thursday, August 7th, 2014

global telecom

The adoption of the "Pulver Order" by the Federal Communications Commission FCC in 2004 recognized the madness of applying 70-year-old Title II telecom regulations to IP communications. Ten years later friends in telecom policy circles spend their days weighing the implications of legal hypotheticals that imagine discrimination by network operators as the primary threat to the communication future. Net neutrality relies on the fear and loathing of telephone companies as a basis for applying Title II regulations to IP networks. This reversal by civil society and entrepreneur friends who had supported Pulver Order puts the madness back in play. The reversal includes circumstances making the network operators allies in preserving the Pulver Order’s deference to technology innovation and Moore’s Law.I did not find anyone who could point to a substantial problem caused by the Pulver Order’s recipe of non-regulation during a recent return visit to Washington, DC. The potential of IP communications won the day in 2004, and the still ever-expanding breadth of communication services make the case stronger a decade later. The 1000 fold expansion of routine connectivity to 10Mbs cost $10,000 per month when I founded Free World Dialup in 1995. The transformation of communication over the last two decades makes the pre-Internet limitations to "long distance" telephone calls and waiting for the mailman seem medieval by comparison. We might convene a conversation to start work on the next 1000 fold expansion, but no one can dismiss the remarkable expansion of communication capacity arriving with IP networks.The fact everyone agrees about the sacred nature of communication explains the power of the fear, uncertainty, and doubt energizing the net neutrality debate. The magnitude of the stakes makes action seem better than inaction and dispassionate reason difficult to muster, but principle of innocent-until-proven-guilty exists for good reasons. In 2004, we argued the experiment known as IP communications should continue without regulation absent an explicit cause for intervention. Preemptive action against the mere perception of risk is always problematic, but the pace of change makes it impossible in the case of IP networks.The madness motivating the Title II enthusiasts and one million comments in the FCC Open Internet proceeding traces to the suffering of a communication public during 20th century. Telephone calls remained an expensive luxury justifiable for narrow personal or business purposes from the invention of the telephone in 1876 through the year 2000. Anyone born before 1980 likely still feels the ticking clock anxiety when talking on the telephone even though IP communications made charging by the minute obsolete. The endorsement of Title II rules for IP communications fails as a solution, because Title II and FCC stewardship caused of the communication drought underlying the upset.The fact Title II makes innovation illegal became clear with my first experience of Voice over Internet Protocol VoIP in the 1993. The ability to "talk" over the Internet felt like running a car on tap water. The conversation always came back to the question of the legality of using IP networks for voice services. The uncertain legal atmosphere made it extremely difficult to attract investors in Vonage. Everyone assumed the FCC would put a stop to startup’s "bypassing" the telephone networks via the usual all-good-things-come-to-an-end sentiment. The history of telecommunications policy includes plenty of examples where government prosecuted innovation as a crime under Title II rules. The first FCC petition after the arrival IP communications argued for declaring VoIP software illegal.

via Fear and Loathing as Telecom Policy | Jeff Pulver.

Research: 2014 Healthcare IT Priorities – InformationWeek Reports

Tuesday, August 5th, 2014

Government mandates and programs are top of mind for the 322 IT pros in our 2014 Healthcare IT Priorities Survey. Meeting Meaningful Use Stage 2 criteria, implementing ICD-10, and working to qualify as an accountable care organization doesn’t leave much time for IT organizations to help healthcare providers optimize the new technology put in place in the last few years. Other data points:>> 30% say their organizations have no plans to use cloud computing.>> 37% say their organizations are implementing or planning to implement Epic electronic health records systems; 22% choose Cerner.>> 20% of providers have a system in place for chronic disease management.>> 17% say security concerns are keeping them from participating in an HIE.Respondent breakdown: 39% work for organizations with 5,000 or more employees; 23% have over 10,000. Fourteen percent are executive IT management C-level or VP. R7840514Survey Name InformationWeek 2014 Healthcare IT Priorities SurveySurvey Date February 2014Region North AmericaNumber of Respondents 322Purpose To gauge the state of healthcare technologyMethodology InformationWeek surveyed 322 technology professionals working for healthcare providers in North America. The survey was conducted online, and respondents were recruited via an email invitation containing an embedded link to the survey. The email invitation was sent to qualified InformationWeek subscribers.

via Research: 2014 Healthcare IT Priorities – InformationWeek Reports.

China puts Microsoft under official investigation

Monday, July 28th, 2014

BEIJING — Government investigators visited Microsoft offices in four Chinese cities Monday, according to a company spokeswoman.
msft china
However, the reason for the visits was not immediately clear.Microsoft, like other U.S. technology giants in recent months, has been under fire from Chinese media for its perceived role in helping the U.S government conduct cyberhacking against China.On Monday, investigators from China’s State Administration for Industry and Commerce SAIC — the nation’s main business authorities — visited Microsoft offices in Beijing, Shanghai, Guangzhou and Chengdu. Microsoft said the purpose of the visit was to begin an official investigation. It did not elaborate further.Microsoft China spokeswoman Joan Li said the company would "actively cooperate" with the government, reported the South China Morning Post, a Hong Kong-based newspaper.The SAIC also provided no further detail about the investigation.Microsoft enjoys huge sales in China but like many Western companies has also suffered attacks by state media, which have fanned nationalist sentiment against the adoption of U.S. technology in the wake of Edward Snowden’s revelations about U.S. government cyberspying.

via China puts Microsoft under official investigation.

Smartphone Thefts Nearly Double in 2013 | PCMag.com

Friday, April 18th, 2014

Some 3.1 million Americans had their phones stolen in 2013, a huge increase from the year before, according to the survey from Consumer Reports. In comparison, around 1.6 million people in the U.S. were the victim of smartphone theft in 2012, meaning the number of victims nearly doubled in a year.

On top of that, people are also losing more phones. Last year, U.S. consumers lost and never reccovered 1.4 million smartphones, up from 1.2 million in 2012.

via Smartphone Thefts Nearly Double in 2013 | News & Opinion | PCMag.com.