POPULARITY
On this episode of The Six Five In the Booth, hosts Daniel Newman and Patrick Moorhead welcome Andrew Coward, General Manager, Software Networking at IBM and Mark McDonald, VP, Wireless Networks at Bell Canada at MWC 2024 for a conversation on how generative AI is being used in the networking landscape. Their discussion covers: The current state of wireless networking and what issues can be solved with AI How generative AI is currently used in networking and how will this change over time as the use of generative AI matures Thoughts from Andrew and Mark on how generative AI will transform both of their respective companies Click here to learn more about IBM's announcements at MWC.
In this episode of the 5G Guys podcast, hosts Dan McVaugh and Wayne Smith explore private wireless networks with guest Jeff Hipchen, a Principal of RF Connect. They discuss how private wireless networks are utilized differently, giving examples in healthcare, professional sports, and higher education sectors. Hipchen emphasizes that private networks allow businesses to control their destiny as they allow the customization and security not offered by public networks. He also highlights how these networks supplement existing services like Wi-Fi and address capacity issues caused by the ever-growing number of devices and applications in use. Lastly, he touches on the potential for even smaller enterprises to improve connectivity. __________________________ Connect With Our Guest __________________________ RF Connect Website ➡︎ https://www.rfconnect.com/ Jeff Hipchen Email ➡︎ jdh@rfconnect.com __________________________ Connect With Our Sponsor __________________________ Vertex Innovations ➡︎ https://vertex-us.com/ __________________________ Connect With Us __________________________ 5G Guys Website ➡︎ https://5gguys.com Social: · Facebook: https://www.facebook.com/5Gguys · LinkedIn: https://www.linkedin.com/groups/12515882 · X: https://twitter.com/5gGuys _______________________________ Submit Your Ideas or Feedback ➡︎ https://5gguys.com/contact-2 _______________________________ Subscribe to the 5G Guys Weekly Newsletter ➡︎ https://mailchi.mp/5gguys/subscribe-to-the-5g-guys _______________________________ ⏰Episode Minute-by-Minute⏰ 00:00 Introduction 00:29 Welcome to the 5G Guys Podcast 01:07 Introducing the Guest: Jeff Hipchen 01:56 The History of RF Connect 03:10 The Evolution of Wireless Networks 10:03 The Shift to Private Networks 11:03 The Benefits of CBRS for Private Networks 13:04 Sponsor Break: Vertex Innovations 13:32 Public Carriers' View on Private Networks 16:00 Examples of Private Network Deployments 21:48 The Role of 4G and 5G in Private Networks 24:14 The Coexistence of Wi-Fi, Public Cellular, and Private Networks 29:36 The Future of Small Venue Solutions 29:43 The Potential of Moken for Private Networks 31:48 Conclusion and Contact Information 32:26 Outro
Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]
Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]
Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]
Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]
The bad news is that wireless communications consumes a lot of power. The good news is that there is a lot of opportunity for improving the energy efficiency of wireless networks.
Sports Geek - A look into the world of Sports Marketing, Sports Business and Digital Marketing
In this Sports Geek Amplify episode, Jeff Alexander, SVP Field Operations at Extenet, explains how private wireless networks can help sports stadiums meet the growing technology demands. To learn more, visit SportsGeekAmplify.com/Extenet
InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this video, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar
T-Mobile had a major cell phone outage in February. Last year, AT&T customers in Minnesota lost service for four days. What would it take to make America's wireless networks more reliable? Harold Feld joins Meghna Chakrabarti.
Dr. Marc Seifer is the preeminent authority on the life and times of Nikola Tesla as evidenced through his exhaustively researched best seller: Wizard. Dr. Seifer 's wide ranging and meticulously researched published articles, novels and books span subjects ranging from metaphysics, behavior analysis to science fiction. Besides his authoring, he is a forensic expert and published master of handwriting analysis. Join Robert Manni, author of The Guys' Guy's Guide To Love as we discuss life, love and the pursuit of happiness. Subscribe to Guy's Guy Radio on YouTube, iTunes and wherever you get your podcasts! Buy The Guys' Guy's Guide to Love now!
Dr. Marc Seifer is the preeminent authority on the life and times of Nikola Tesla as evidenced through his exhaustively researched best seller: Wizard. Dr. Seifer 's wide ranging and meticulously researched published articles, novels and books span subjects ranging from metaphysics, behavior analysis to science fiction. Besides his authoring, he is a forensic expert and published master of handwriting analysis. Join Robert Manni, author of The Guys' Guy's Guide To Love as we discuss life, love and the pursuit of happiness. Subscribe to Guy's Guy Radio on YouTube, iTunes and wherever you get your podcasts! Buy The Guys' Guy's Guide to Love now!
4G and 5G cellular networks are becoming increasingly popular amongst enterprises as more organizations look for ways to accelerate their digital strategy. However, many challenges come with private cellular networks, such as finding the right solution that meets business application needs, its cost-effectiveness, security, reliability, and scalability. How do those challenges differ across verticals and use cases and what are the critical success factors for the day-1 and, more importantly, day-2 operations of the private cellular network? Let's find out. Our guest for this podcast is Jason Inskeep, Assistant Vice President at AT&T for the 5G Center of Excellence, focusing on private cellular and the Edge. In our discussion today, we will uncover a few things, such as: - The challenges business face in adopting private wireless technologies.- How public and private cellular can co-exist and complement each other.- Where the momentum is now in private cellular networks.- Where the gaps are between enterprise needs and the telecom sector. - How CIOs should rethink wireless network strategy to meet their emerging digital automation needs.So, let us welcome Jason Inskeep.
Industry 4.0 technologies such as IoT, Artificial Intelligence (AI), extreme automation and digital twins indisputably provide significant benefits to many enterprises, including increased productivity, greener operations and enhanced worker safety. Yet, many industrial sites may appear difficult to digitalize. From rock quarries and mining pits to factories, warehouses and chemical plants, achieving ubiquitous connectivity that securely and reliably powers all people, machines and devices in complex, dynamic and often harsh environments has proven challenging in the past. With the paradigm shift brought by flexible, high-performance private wireless networks these challenges are no longer a concern of enterprises. Tune in to hear Joel Albert, VP of Services for Industrial Networking Solutions, and Jim Connor, Partner Sales Manager at Nokia discuss how to accelerate Industry 4.0 digitalization for your operations.
In this episode, we talk wireless network with Rowell Dionicio, from @ClearToSend ! More from Rowell: Twitter: https://twitter.com/rowelldionicio Website: https://rowelldionicio.com/ Clear to Send: Twitter: https://twitter.com/cleartosend YouTube: https://www.youtube.com/@ClearToSend Website: https://www.cleartosend.net/ Check out our Patreon – https://www.patreon.com/artofnetengFollow us on Twitter https://twitter.com/artofnetengFollow us on Instagram https://www.instagram.com/artofneteng/Like us on Facebook https://www.facebook.com/artofnetengJoin the group on LinkedIn https://www.linkedin.com/company/artofneteng/Check out our website https://artofnetworkengineering.comMerchContinue reading "Ep 111 – Wireless Networks"
The prevalence of Parkinson's disease has grown more than 50% in recent years, and early onset diagnosis is increasing at an even faster rate. Due to its slow, subtle progression and variable response to medications, this condition can be difficult for clinicians to manage. The work of Dr. Dina Katabi, Director of the MIT Center for Wireless Networks and Mobile Computing, may change that. Her team has shown that discrete, radio wave emitting devices in the home can be used to track patient movement and health parameters like sleep quality. In this episode, Dr. Katabi explains how this work will make healthcare more precise and accessible than ever before. Music Credits: “Land of the midnight sun” and “I hope you hear this” by Rukudzo.
GUEST: Alex Wilson, Collabsion, Inc.HOST: Harry Brelsford, The CannaTech Group The cannabis industry is a huge industry with an estimated global value of 27.7 billion USD and growing daily. With the industry expanding into other industries many cannabis businesses are turning to technology to help drive growth, increase safety and security, as well as streamline processes to increase productivity. Although, many cannabis businesses are turning to technology some are struggling with availability due to location. Many farmers who want to use harvesting technologies are struggling to access Wi-Fi allowing them to use the technologies available. Harry Brelsford of the CannaTech Group sits down with Alex Wilson of Collabsion, Inc. to discuss Wi-Fi networking in remote locations.Watch the Interview @ TheCannaTechGroup.com
Today, we're joined by Clarissa Redwine. When I first met Clarissa back in 2017, she was the West Coast Design and Tech outreach lead for Kickstarter. She's also an NYU Law Fellow focused on open source hardware and is now the Grant's Program Manager at Helium, a wireless network that's working to build a decentralized telecom.You can follow @Supplyframe and @Hackaday on Instagram, LinkedIn, YouTube, and Twitter, and @SupplyframeDesignLab on Instagram and Twitter. The BOM is a Supplyframe podcast hosted by Majenta Strongheart, written, produced, and edited by Frank Driscoll and co-edited by Daniel Ferera. Executive producers are Ryan Tillotson and Tyler Nielsen. Theme music is by Ana Hogben, with show art by Thomas Schneider. Special thanks to Giovanni Salinas, Bruce Dominguez, Thomas Woodward, Jin Kumar, Jordon Clark, Matt Gunn, the entire Supplyframe Team, and you, our wonderful listeners.
Amir Haleem, Founder of Helium, talks about his plans to build “The People's Network” - a decentralized, wireless network powered by blockchain that could wrap the entire globe, forever changing the Telecom Industry. Helium allows users to simply plug in a hotspot, join the network, and earn Helium's token, HNT, as a reward. Amir shares how this innovative business model allowed his company to go from 0 to 1,000,000 nodes in less than 3 years, how Helium will continue to scale, and what hurdles they'll have to jump along the way. JOIN THE FREE WOLF DEN NEWSLETTER
Your network works for you. Your network has all the data it needs to make it a better network. However, with people coming and going, your network environment becomes a living and breathing entity that is dynamic based on the number of users, the demand for bandwidth and other environmental changes that happen over time. If your network does not adjust to these changes, performance suffers for all devices including IoT and user devices. A solution is needed that continually monitors and optimizes the network to these changes providing the best operational efficiency. Tune in to this episode to learn how Cisco has optimized RRM, leveraging Artificial Intelligence to adaptively optimize your wireless network. As a part of Cisco DNA Center AI-Enhanced RRM uses historical data, AP density and other trends to provide the best wireless experience in a dynamic environment. Related links https://cisco.com/go/dnacenter.com/?dtid=opdcsnc001469 Follow us: twitter.com/CiscoChampion Cisco Champion Hosts Kjetil Teigen Hansen (twitter.com/mrTeigen), Conscia Norge AS, System Engineer Mike Bolitho (twitter.com/NetEngMike), CommonSpirit Health, Wireless Engineer Richard Atkin (twitter.com/ukricha), ITGL, Solution Architect Guest Jim Florwick, Cisco, Technical Marketing Engineer, ENB TME Platforms Moderator Amilee San Juan (twitter.com/amileesan1), Cisco, Customer Voices and Cisco Champion Program
In this episode we are going to look at Introduction to Wireless.We will be discussing Benefits of Wireless, Types of Wireless Networks, Wireless Technologies, 802.11 Standards, Radio Frequencies, and Wireless Standards Organizations.Thank you so much for listening to this episode of my series on Switching, Routing, and Wireless Essentials for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Switching, Routing, and Wireless Essentials v2 (SRWE)Episode 12 - WLAN ConceptsPart A - Introduction to WirelessPodcast Number: 42-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment
Okay, Computer. co-hosts Dan Nathan, Rick Heitzmann and Meltem Demirors discuss the Twitter buyback (9:17), Tik Tok (17:36), and private market valuations (26:12). Later, Dan and Rick interview Amir Haleem, Founder and CEO of Helium Systems, and talk about decentralized telecom applications (34:40). ---- Email us at contact@riskreversal.com with any feedback, suggestions, or questions for us to answer on the pod and follow us @OkayComputerPod. We're on social: Follow Dan Nathan @RiskReversal on Twitter Follow @GuyAdami on Twitter Follow us on Instagram @RiskReversalMedia Subscribe to our YouTube page
Okay, Computer. co-hosts Dan Nathan, Rick Heitzmann and Meltem Demirors discuss the Twitter buyback(9:17), Tik Tok (17:36), and private market valuations(26:12). Later, Dan and Rick interview Amir Haleem, Founder and CEO of Helium Systems, and talk about decentralized telecom applications (34:40). ---- Email us at contact@riskreversal.com with any feedback, suggestions, or questions for us to answer on the pod and follow us @OkayComputerPod. We're on social: Follow Dan Nathan @RiskReversal on Twitter Follow @GuyAdami on Twitter Follow us on Instagram @RiskReversalMedia Subscribe to our YouTube page
Private wireless networks have the potential to deliver significant benefits for schools, businesses and other organizations throughout rural America, while helping to bridge the digital divide. In this episode, CoBank's Jeff Johnston speaks with Tim Courtney, vice president of sales and strategy at Further Enterprise Solutions, to discuss the emerging role of private wireless networks. Listen to their conversation for insights on how the availability of the CBRS band is enabling smaller organizations to build carrier-grade wireless networks at a reasonable cost.
On the menu for today's show:Is omicron going to spoil your holidays? There's lot of new data out today and much of it is conflicting -- so we'll try to get to the bottom of what we know, and what we still don't know.Pfizer makes changes to its COVID vaccine clinical trial in kids under the age of 5, after it finds that two doses aren't doing the trick.And the FDA eases access to an abortion pill that might turn the entire reproductive rights debate on its head.5G wireless is coming -- and while it might be a really good thing for your phone -- it might be really bad for the airline industry.2021 for Hollywood ... good movies ... but still a poor showing in terms of the audience in theatres. And: would you turn your dead relative or friend into an artificial intelligence program...........that you could continue to talk with years after they're gone? To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
On the menu for today's show: Is omicron going to spoil your holidays? There's lot of new data out today and much of it is conflicting -- so we'll try to get to the bottom of what we know, and what we still don't know. Pfizer makes changes to its COVID vaccine clinical trial in kids under the age of 5, after it finds that two doses aren't doing the trick. And the FDA eases access to an abortion pill that might turn the entire reproductive rights debate on its head. 5G wireless is coming -- and while it might be a really good thing for your phone -- it might be really bad for the airline industry. 2021 for Hollywood ... good movies ... but still a poor showing in terms of the audience in theatres. And: would you turn your dead relative or friend into an artificial intelligence program...........that you could continue to talk with years after they're gone? Learn more about your ad choices. Visit podcastchoices.com/adchoices
Micha Benoliel is the co-founder and CEO of Nodle, a decentralized wireless network connecting IoT devices to the internet. We discuss how Nodle is building the world's largest eco-friendly wireless network to connect and secure the internet of things. Tune in to learn more.Before founding Nodle, Micha enabled Skype to launch Skype In And Skype Out. He also built FireChat, the first decentralized messaging app leveraging the peer-to-peer mesh technology.Micha also shares his thoughts on Web3 and the future of decentralized connectivity, plus its exciting implications. Key points discussed- Investing in decentralized wireless networks (00:00)- Micha's backstory and how Nodle came to be (01:41)- The practical applications of decentralized networks (06:02)- How does a decentralized network differ from a wireless network? (08:22)- How you can profit by joining a decentralized network (10:52)- The top challenges Nodle faces today (17:00)- The exciting implications of decentralized connectivity (21:06)- Why the future of Web3 looks so promising (29:15)- Bringing profit back to the people (37:28) Additional resourcesLearn more about Nodle and their work here:https://www.nodle.com/Nodle Parachain: parachain.nodle.comNodle Cash app: Nodle.cashTo keep in the loop for the latest developments in crowdfund investing, make sure to follow this podcast and listen in every week. Leave a rating and a review, and let's bring profit back to the people together.Ready to start investing in your future? Then head over to www.republic.co and find a startup you're passionate about.Legal Disclaimer: The Securities and Exchange Commission (SEC) has qualified the offering statement that we have filed with the SEC. The information in that offering statement is more complete than the information we are providing now and could differ in important ways. You must read the documents filed with the SEC before investing. The offering is being made only by means of its offering statement. This document shall not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction. An indication of interest involves no obligation or commitment of any kind. Any person interested in investing in any offering of Props Tokens should review our disclosures and the publicly filed offering statement and the final offering circular that is part of that offering statement at http://offeringcircular.propsproject.com. YouNow is not registered, licensed or supervised as a broker-dealer or investment adviser by the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), or any other financial regulatory authority or licensed to provide any financial advice or services.
The notion of private wireless networks has gained prominence with concepts such as Industry 4.0, smart cities, campus networks, and Enterprise IT/OT integration and critical communications.Private wireless networks are enabled by cost-effective, open-standard radio and core equipment that can be programmed for specific user needs, built to 4G and 5G specifications, and having access to shared-spectrum such as CBRS or dedicated licenses.What is a private network, which vertical markets are candidates, and what does it take to build and operate such networks?John Celentano, Inside Towers Business Editor discusses opportunities for private wireless network adoption with Todd Landry, Corporate Vice President, Product & Market Strategy at JMA Wireless and Mick O'Dwyer, Sales & Marketing Director at Druid Software.Support the show (https://insidetowers.com/subscription/)
Whether you're a business owner, educator, or even just a person who is connected to the world there is no doubt that wireless technology has become a necessity. Dubbed the fourth utility, it's clear that popular wireless networks are becoming crowded and more at risk of security breaches. If you've ever felt like you were at the mercy of your wireless network provider then this episode is for you. Welcome back to 5G Guys! In today's episode, we go over private wireless networks, why they were created, how they work, and what they are being used for. While wireless networks are something that most people rely on for work and business, private wireless offers many possibilities that can increase your efficiency, up your security, and even improve your productivity. We talk about how businesses are innovating with their own private wireless networks and how you can get ahead of the curve in your own life. Join us as we talk about why private wireless networks were created and how you can take advantage of this opportunity. You'll get a look into how private wireless networks have been used so far, from communication between land and sea to offering a solution for educators in a pandemic. You'll learn about the spectrum of CBRS and how it's helped create simple solutions to otherwise difficult problems. As well as the flexibility and control you have within your own private wireless network. While the idea of creating a private wireless network can seem daunting we encourage you to hit play, sit back, and relax. Don't wait for your wireless network provider to become unreliable, stay one step ahead and learn what private wireless networks can do for you. For more resources or to connect with us, check out the links below! More Of What's Inside: What a private wireless network is Taking back your network control Upping security with a private network CBRS and why it was built Creating a spectrum with no interference Moving past the capabilities of wifi Bringing 4g and 5g into private networks How private wireless networks have helped education Having two phones inside of one Eliminating operational expenses with your own private network And much more! LINKS: Website: Website: https://5gguys.com Social: Facebook: https://www.facebook.com/5Gguys LinkedIn: https://www.linkedin.com/groups/12515882 Twitter: https://twitter.com/5gGuys Submit Your Ideas or Feedback: https://5gguys.com/contact-2 Episode Minute By Minute: 0:23 - What we cover today 2:30 - Why you need a private network 6:17 - CBRS and what it means to you 10:50 - How companies have wanted to use private networks 15:22 - Private networks and school districts 18:56 - Dual SIM cards and security advancements 22:52 - Saving money and making the right fit for you 25:41 - Closing thoughts
Amazon and Apple are each working towards one goal: A large-scale wireless network that doesn’t need Wi-Fi or cellular. We will spend money on their phones, cameras, trackers and more to create the network for them. It’s genius. Learn more about your ad choices. Visit megaphone.fm/adchoices
Amazon and Apple are each working towards one goal: A large-scale wireless network that doesn’t need Wi-Fi or cellular. We will spend money on their phones, cameras, trackers and more to create the network for them. It’s genius. Learn more about your ad choices. Visit megaphone.fm/adchoices
Kelly talks to Michael Geist, internet and e-commerce law expert at the university of Ottawa See omnystudio.com/listener for privacy information.
America and the rest of the world have many concerns over China and its involvement in 5G wireless networks. Here, we discuss those concerns and how we plan to deal with any problems as a country. --- Support this podcast: https://podcasters.spotify.com/pod/show/businessmindspodcast/support
Recently, I tested a stretch of rural Ohio. I tested all 3 major wireless providers. I share my experience and test results. (S2 E25) --- Send in a voice message: https://anchor.fm/smtreport/message
In an era where computers and networks are inseparable parts of our lives, would you dare to imagine what these ideas might have looked like a few decades ago when they were nothing but idealistic concepts? We discussed the realities and challenges of that world further with Prof. B.S. Manoj who experienced this revolution first hand from a scientific perspective, and continues to create and engage deeply with the futuristic ideas at present. From the Internet and wireless networks, through cellular data networks, to the internet of things and even quantum computing — his ideas of research and expertise span vast and wide. Dive in to hear about his fascinating journey into science and the pioneering research work that he undertakes in the exciting field of networking and communication! The team for Zeroing In for this episode included Ansuman Palo, Fenil Shah, Shreya Mishra, Manish Chauhan, Prajwal Patnaik, KVNG Vikram and Naman Jain. Featured artwork for the episode cover courtesy of Akshita Arora. Zeroing In season's theme song featured herewith, 'Longing', created by Ethan Phangcho.
T-Mobile could hurt the future of all wireless networks, mmWave continues to blossom! (S2 E15) --- Send in a voice message: https://anchor.fm/smtreport/message
Hosts Tom Shaughnessy sits down with Anatoly Yakovenko, Maya Zehavi and Ryan Gentry for a wide reaching discussion on the parallels between the wireless industry and crypto. From how Wireless technologies played out on a geographic basis, to narrative changes and where value accrued, there are clear comparisons between the two industries. I was thrilled to have on a group of wireless experts turned crypto experts! - Twitter: Anatoly's Twitter: https://twitter.com/aeyakovenko Maya's Twitter: https://twitter.com/mayazi Ryan's Twitter: https://twitter.com/RyanTheGentry Tom's Twitter: https://twitter.com/Shaughnessy119 Chain Reaction Twitter: https://twitter.com/chainpodcast Support The Show Thank you to our sponsor AltoIRA for making this happen! Visit Altoira.com/Chainreaction for more information! Our Video interviews Can Be Viewed Here: https://youtu.be/fubeSokngY8 Access Delphi's Research Here: https://www.delphidigital.io/ Disclosures: This podcast is strictly informational and educational and is not investment advice or a solicitation to buy or sell any tokens or securities or to make any financial decisions. Do not trade or invest in any project, tokens, or securities based upon this podcast episode. The host may personally own tokens that are mentioned on the podcast. Tom Shaughnessy owns tokens in ETH, BTC, CKB, MLN, SNX, RUNE, BNT, and HNT. Lets Talk Bitcoin is a distribution partner for the Chain Reaction Podcast, and our current show features paid sponsorships which may be featured at the start, middle, and/or the end of the episode. These sponsorships are for informational purposes only and are not a solicitation to use any product or service.
In the fifth episode of “Talking Digital Industries” moderator Chris Brow dives into the topic of Industrial 5G and learns why it is an essential topic for the industry. Together with his guests Sander Rotmensen, Head of Product Management Industrial Wireless & Security Components at Siemens Digital Industries and Andreas Kornbichler, Head of research group “Wireless Networks” at Siemens Corporate Technology he discusses why 5G brings more than faster download speeds, how robots can become cobots and why 5G isn´t always 5G. Join our podcasters and have a look into the “Zauberkugel” (crystal ball) to learn about 5G and to explore what will happen beyond 5G. See acast.com/privacy for privacy and opt-out information.
In the fifth episode of “Talking Digital Industries” moderator Chris Brow dives into the topic of Industrial 5G and learns why it is an essential topic for the industry. Together with his guests Sander Rotmensen, Head of Product Management Industrial Wireless & Security Components at Siemens Digital Industries and Andreas Kornbichler, Head of research group “Wireless Networks” at Siemens Corporate Technology he discusses why 5G brings more than faster download speeds, how robots can become cobots and why 5G isn´t always 5G. Join our podcasters and have a look into the “Zauberkugel” (crystal ball) to learn about 5G and to explore what will happen beyond 5G. See acast.com/privacy for privacy and opt-out information.
In this episode of Cisco Champions Radio, our Cisco Champions talk to Cisco’s Wireless Product Manager, Ankur Bhasin, about Wireless Resiliency, as in no longer waiting for scheduled down-time to deploy new Access Points or software updates. The discussion also covers the new Cisco DNA Center feature, User Defined Network (UDN), for use cases like dormitories or long-term hospital stays; as well as other Wireless resiliency topics. https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html?dtid=opdcsnc001469 Cisco Champion hosts Dan Kelcher, NTT Data Services, Enterprise Architecture Advisor Samuel Clements (https://twitter.com/samuel_clements), Presidio, Engineering Director, Office of the CTO, Mobility Guest Ankur Bhasin, Cisco, Wireless Product Line Manager Moderator Lauren Friedman (https://twitter.com/lauren), Technical Influencer Marketing and Cisco Champions Program
In this episode of Cisco Champions Radio, our Cisco Champions talk to Cisco’s Wireless Product Manager, Ankur Bhasin, about Wireless Resiliency, as in no longer waiting for scheduled down-time to deploy new Access Points or software updates. The discussion also covers the new Cisco DNA Center feature, User Defined Network (UDN), for use cases like dormitories or long-term hospital stays; as well as other Wireless resiliency topics. https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html?dtid=opdcsnc001469 Cisco Champion hosts Dan Kelcher, NTT Data Services, Enterprise Architecture Advisor Samuel Clements (https://twitter.com/samuel_clements), Presidio, Engineering Director, Office of the CTO, Mobility Guest Ankur Bhasin, Cisco, Wireless Product Line Manager Moderator Lauren Friedman (https://twitter.com/lauren), Technical Influencer Marketing and Cisco Champions Program
You may not think much about what happens when you pull out your smartphone to make a call or browse the web, but a lot of work goes into making that connection possible. From building cell towers to bidding on spectrum, the challenges are varied and complicated. On this episode we have Allen Bennion and Jeff Cranney from STRATA Networks to shed some light on the many factors involved with building wireless networks, and what 5G really means for you.
187. Different Types of Wireless Networks Intended Audience: Newcomers to Pharmacy InformaticsToday, we go over some of the different types of wireless network technologies that are in use today. Wireless technologies are important in many healthcare technologies, including workflow technologies, telehealth, digital health, and more. Follow us on social media! Twitter: @pharmacyitme Instagram: @pharmacyinformatics LinkedIn: https://www.linkedin.com/company/pharmacyitme/ Website: Pharmacy IT & Me Email: tony@pharmacyitme.com Follow Tony's personal Twitter account at @tonydaopharmd Network with other pharmacists at Pharmacists Connect!http://pharmacistsconnect.com For more information on pharmacy informatics, check out some of the following useful links: ASHP's Section of Pharmacy Informatics and Technology: https://www.ashp.org/Pharmacy-Informaticist/Section-of-Pharmacy-Informatics-and-Technology/ HIMSS Pharmacy Informatics Community: https://www.himss.org/library/pharmacy-informatics Disclaimer: Views expressed are my own and do not reflect thoughts and opinions of any entity with which I have been, am now, or will be affiliated.This podcast is powered by Pinecast.
Do you know the connection between a 10th-century Nordic king and Bluetooth technology? Interested in the latest dialogue about IoT wireless protocols? Join us in RIoT Studios with two guests from Nordic Semiconductor, Clay Hine and Scott Bland. Clay and the Nordic team have been fabulous RIoT supporters, offering workshops, exhibit tables, and more at RIoT events. Join us for this episode to hear Clay in person, and you'll understand why his group is such a valuable part of the IoT ecosystem. Nordic Semiconductor is a fabless semiconductor company specializing in ultra-low power performance wireless system on a chip (SoC) and connectivity devices for the 2.4 GHz ISM band, with power consumption and cost being the main focus areas. Typical end-user applications are consumer electronics, wireless mobile phone accessories, wireless gamepad, mouse, and keyboard, intelligent sports equipment, wireless medical, remote control, wireless voice-audio applications, security, and toys.Support the show (http://www.ncriot.org)
Today we get to know Melody Walker of Boingo Wireless. Over the past 18 years Boingo has grown from start-up to the leading Wi-Fi company in the world, and the largest indoor DAS (cellular) provider in the United States. To support the Women in Tech podcast go to https://www.patreon.com/womenintech - tweet @womenintechshow and @EspreeDevora. https://twitter.com/Boingo http://twitter.com/womenintechshow https://twitter.com/espreedevora
Day 21: Today I will discuss: How hackers attack on WIRELESS NETWORKS? 1. How have wireless technologies changed our lives? 2. Different types of possible attacks on wireless network? 3. Demonstration of the WIRELESS ATTACK. Please leave the comments and share with your friends. You can connect with me: Facebook Page : Cybersecurity Prism (https://www.facebook.com/LuminisConsultingServices) Facebook Group : Cybersecurity Forever (https://www.facebook.com/groups/642084319272190/) Linkedin Page : Cybersecurity Prism (https://www.linkedin.com/company/10117131/) Hear My Podcast: https://anchor.fm/meena-r #Cybersecurity #linux #EthicalHacking #Hacking #Hacker #cybersecurityawareness #cybersecuritythreats #cybersecuritytraining #informationsecurity #itsecurity #Cyber #Security #KaliLinux #networking, #hacked #technology #IT #infosec #computers #privacy #datasecurity #malware #ransomeware #cyberattack #iot #itsecurity #cyberthreats #cyberattack #pentesting #cloudsecurity #computersecurity #jobs --- Send in a voice message: https://anchor.fm/meena-r/message
Are wireless companies overlooking the dangers of new technology to keep up with market demand? Theodora Scarato joins Dr. George to discuss the dangers of 5G wireless technology.
For episode 304, Dr. Kvedar talks with Dina Katabi, MIT Professor and Director of the Center for Wireless Networks and Mobile Computing. They have an interesting discussion about the system she designed to passively collect data without the need for devices, why it represents a major advancement in data collection and how all of this... Read more »
Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html Support our show
Podcast: Automation World Gets Your Questions AnsweredEpisode: Configuring Wireless Networks for Mobile UsePub date: 2019-06-21In this third episode of the “Automation World Gets Your Questions Answered” podcast series, we connect with Justin Shade of Phoenix Contact to explore industrial wireless technologies and their OT/IT collaboration requirements, speed capabilities, and security concerns. This podcast is sponsored by Allied Electronics and Automation.The podcast and artwork embedded on this page are from Automation World, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
George Sklivanitis, founder of Extreme Comms Lab, believes we can build underwater wireless networks. Using enhanced modems on existing nodes (such as ships and submarines), his team’s technology can boost signal strength under the sea by 10 times. A native of Athens, Greece, George studied on the island of Crete before moving to Buffalo NY, and finally Florida Atlantic University. His advice to prospective inventors: “Use criticism as a fuel to keep going. Don’t give up.”
In this third episode of the “Automation World Gets Your Questions Answered” podcast series, we connect with Justin Shade of Phoenix Contact to explore industrial wireless technologies and their OT/IT collaboration requirements, speed capabilities, and security concerns. This podcast is sponsored by Allied Electronics and Automation.
In this episode of the Smart Community Podcast, I spoke with Adam Davis, the Director of TPL Connect, and a consultant in the design and delivery of Wired and Wireless Networks in Smart Cities, Data Centres, IoT, Telecommunications and Enterprise sectors. Adam shares with us his background as a cabling technician and project manager, and how working with local councils in ICT design and strategy really sparked his interest in the Smart City space. Adam tells us how he sees Australia currently embracing the Smart City or Smart Region concept, and some of the mistakes he's seen Councils make when adopting new technology. We discuss the importance of having an overarching vision or roadmap when undertaking any kind of Smart City planning, and what some of the key components of such a framework are. Adam shares some of the projects he's currently working on, primarily focusing on the foundation layer such as fibre infrastructure to support wireless and sensor networks, and the amount of that foundation layer technology that is needed before the 5G network can be usable. Adam says that boring foundation layer of infrastructure is something that's often overlooked in the Smart arena, and how it's an emerging trend/problem we should all be talking about more. We also cover the need for interoperability of new tech so that legacy systems don't hinder progress, why councils need multidisciplinary teams in order for integration to be successful, and finish our chat discussing the emerging trend of skillset gaps in both city and regional teams, such as lack of data analysts, integration and systems thinking. As always I hope you enjoy listening to this episode as much as I enjoyed making it.Find the full show notes as: www.mysmart.communityConnect with Adam via LinkedIn or email adam.davis@tplconnect.com.auConnect with me via email: hello@mysmart.communityConnect via LinkedIn, Twitter and Facebook @smartcommpod
The world of wireless networks has evolved from a commodity to a core part of data strategy, and early concerns about speed and security are being replaced with a desire to know what to do with all the data coming in. Özer Dondurmacıoğlu, VP of Location Services at HPE Aruba, joined the podcast to talk about why wireless networks are now key to your customer intelligence strategy.
Dr. Vinod Namboodiri graduated with a Ph.D. in Electrical and Computer Engineering from the University of Massachusetts, Amherst. His research interests have been in the design, analysis and evaluation of systems that solve challenges in Mobile Computing, Wireless Networks, and Smart Electric Power Grids. Dr. Namboodiris current research interests are in the design and application of technology to make communities more accessible for those with disabilities.
In this episode of the Cisco Learning Network Podcast, you will get an introduction to the types of wireless networks and topologies that exist today. We hear from Bob Liggett, an wireless networking engineer and content developer for Cisco. The episodes contains audio portions of a CCNA Wireless webinar series hosted by the Cisco Learning Network. To view the full webinar this segment is from, and more CCNA Wireless Training videos to help you get started in your networking career, please go to: http://cs.co/9001DoMsv
DPharm podcast series # 2 MIT Professor, Dina Katabi, PhD gave one of the best talks on in home non-intrusive patient monitoring at DPharm 2017 and provided a demo of technology that uses ambient radio signals to monitor a patient’s gait, falls, breathing, heart rate and even sleep, all without putting any sensor on the patient’s body. Find out how they have used the technology to redefine clinical endpoints and pushed clinical trials to the home. The next DPharm conference is September 25-26 in Boston. DPharm reports on innovation and disruptive innovation to advance clinical trials and supports the community behind the movement. Speaker: Dina Katabi, PhD MacArthur Fellow, Andrew & Erna Viterbi Professor, MIT, and Director of MIT Center for Wireless Networks and Mobile Computing Producer: Valerie Bowling, Executive Director, DPharm
Institute of Advanced Legal Studies Restricted and Redacted: Where now for human rights and digital information control? Panel A - Afternoon Session Intermediary Liability and Community Wireless Networks Design Shaping: the Mc Fadden ECJ Case...
We have more Ken Munro in this second part of our podcast. In this segment, Ken tells us how he probes wireless networks for weaknesses and some of the tools he uses. One takeaway for me is that the PSKs or passwords for WiFi networks should be quite complex, probably at least 12 characters. The hackers can crack hashes of low-entropy WiFi keys, which they can scoop up with wireless scanners. Ken also some thoughts on why consumer IoT devices will continue to be hackable. Keep in mind that his comments on security and better authentication carry over quite nicely to the enterprise world. Transcript Inside Out Security: You’ve focused mostly on testing the IoT — coffee makers, doorbells, cameas –and it’s kind of stunning that there’s so much consumer stuff connected to the internet. The Ring Doorbell and iKettle, were examples I think, where you obtained the WiFi PSKs (pre-shared keys). Could you talk more your work with these gadgets? Ken: Yeah, so where they're interesting to us is that in the past to get hold of decent research equipment to investigate, it used to be very expensive. But now that the Internet of Things has emerged. We're starting to see low-cost consumer goods with low-cost chip sets, with low-cost hardware, and low-cost software starting to emerge at a price point that the average Joe can go and buy and put into their house. A large company, if they buy technologies, has probably got the resources to think about assessing their security … And put some basic security measures around. But average Joe hasn't. So what we wanted to do was try and look to see how good the security of these devices was, and almost without exception, the devices we've been looking at have all had significant security flaws! The other side of it as well, actually, it kind of worries me. Why would one need a wireless tea kettle? IOS: Right. I was going to ask you that. I was afraid to. Why do you think people are buying these things? The advantage is that you can, I guess, get your coffee while you're in the car and it'll be there when you get home? Ken: No. It doesn't work like that …Yeah, that's the crazy bit. In the case of the WiFi kettle, it only works over WiFi. So you've got to be in your house! IOS: Okay. It's even stranger. Ken: Yeah, I don't know about you but my kitchen isn't very far away from the rest of my house. I'll just walk there, thanks. IOS: Yeah. It seems that they were just so lacking in some basic security measures … they left some really key information unencrypted. What was the assumption? That it would be just used in your house and that it would be just impossible to someone to hack into it? Ken: You're making a big step there, which is assuming that the manufacturer gave any thought to an attack from a hacker at all. I think that's one of the biggest issues right now is there are a lot of manufacturers here and they're rushing new product to market, which is great. I love the innovation. I'm a geek. I like new tech. I like seeing the boundaries being pushed. But those companies that are rushing technologies to market with not really understanding the security risk. Otherwise, you're completely exposing people's homes, people's online lives by getting it wrong. IOS: Right. I guess I was a little surprised. You mentioned in your blog something called wigle.net? Ken: Yeah, wigle is …. awesome and that's why WiFi's such a dangerous place to go. IOS: Right. Ken: Well, there's other challenges. It's just the model of WiFi -- which is great, don't get me wrong -- when you go home with your cell phone, your phone connects to your WiFi network automatically, right? Now, the reason I can do that is by sending what are called client probe requests. And that's your phone going, "Hey, WiFi router, are you there? Are you there? Are you there?" Of course, when you're out and about and your WiFi's on, it doesn't see your home WiFi router. But when you get home, it goes, "Are you there?" "Yeah, I'm here," and it does the encryption and all your traffic's nice and safe. What wigle does — I think it stands for wireless integrated geographic location engine, which is crazy … security researchers have been out with wireless sniffers, scanners, and mapped all the GPS coordinates of all the wireless devices they see. And then they collate that onto wigle.net, which is a database of these which you can basically query a wireless network name … and work out where they are. So it's really easy. You can track people using the WiFi on their phones using wigle.net. You can find WiFi devices. A great example of that was how we find the iKettle, that you can search wigle.net for kettles. It's crazy! IOS: Yeah, I know. I was stunned. I had not seen this before. I suspect some of the manufacturers would be surprised if they saw this. We see the same thing in the enterprise space or IT. I'm just sort of surprised that's just so many tools and hacking tools out there. But in any case, I think you mentioned that some of these devices start up as an access point and that, in that case, you know the default access name of the iKettle or whatever the device is, and then you could spot it. Is this the way the hackers work? Ken: No, that's right. The issue with an IoT WiFi device is that when you first put it up, you need to get through a process of connecting to it and connecting it to your home WiFi network. And that is usually a two-stage process. Usually. It depends. Some devices don't do this but most devices, say, the iKettle, will set itself up as an access point first or a client-to-client device, and then once you go in and configure it with your cell phone, it then switches into becoming a client on your WiFi network. And it's going through that set of processes where we also found issues and that's where you can have some real fun. IOS: Right. I think you took the firmware of one of these devices and then was able to figure out, let's say, like a default password. Ken: Yeah. That's another way. It's a completely different attack. So that's not what we'll do in the iKettle. We didn't need to go near the firmware. But a real game changer with IoT devices is that the manufacturer is putting their hardware in the hands of their customers … Let's say you're a big online retailer. Usually you bring them in with application and you buy stuff. With the Internet of Things, you're actually putting your technology -- your kit, your hardware, your firmware, your software — into the hands of your consumers. If you know what you're doing, there's great things you can do to analyze the firmware. You can extract off from devices, and going through that process, you can see lots of useful data. It's a real game changer, unlike a web application where you can protect it with a firewall … But the Internet of Things, you put your chips into the hands of your customers and they can do stuff with that potentially, if they have got security right. IOS: Right. Did you talk about they should have encrypted the firmware or protected it in some way? Is that right? Ken: Yeah. Again, that's good practice. In security, we talk about having layers of defense, what we call defense in depth so that if any one layer of the security chain is broken, it doesn't compromise the whole device. And a great example for getting that right would be to make sure you protect the firmware. So you can digitally sign the code so that only valid code can be loaded onto your device. That's a very common problem in design where manufacturers haven't looked at code signing and therefore we can upload rogue code. A good example of that was the Ring doorbell. Something that's attached to the outside of your house. You can unscrew it. You can walk off with it. And we found one bug whereby you can easily extract the WiFi key from the doorbell! Again, the manufacturer fixed that really quickly, which is great, exactly what we want to see, but our next step is looking at it and seeing if we can take the doorbell, upload a rogue code to it, and then put it back on your door. So we've actually got a back door on your network. IOS: Right, I know. Very scary. Looking through your blog posts and there were a lot of consumer devices, but then there was one that was in a, I think, more of a borderline area and it was ironically a camera. It could potentially be a security camera. Was that the one where you got the firmware? Ken: Yeah, that was an interesting one. We've been looking at some consumer grade CCTV cameras, although we see these in businesses as well. And we've particularly been looking at the cameras themselves and also the digital video recorders, the DVRs where they record their content onto. So many times we find someone has accidentally put a CCTV camera on the public Internet. You've got a spy cam into somebody's organization! The DVR that records all the content, sometimes they put those on the Internet by mistake as well. Or you find the manufacturers built it so badly that .. it goes on by itself, which is just crazy. IOS: Yeah, there's some stunning implications, just having an outsider look into your security camera. But you showed you were able to, from looking at the...it was either the firmware or once you got into the device, you could then get into network. Was that right? Ken: Yeah, that's quite ironic really, isn't it? CCTV cams, you consider to be a security device. And what we found is not just the camera but also the DVR, if you put it on your network and ,,, it can create a backdoor onto your network as well. So you put on a security device that makes you less secure. IOS: One of things you do in your assessments is wireless scanning and you use something, if I'm not mistaken, called Kismet? Ken: Kismet's a bit old now ... There are lots of tools around but the Aircrack suites is probably where it's at right now And that's a really good suite for wireless scanning and wireless g cracking. IOS: Right. So I was wondering if you could just describe how you do a risk assessment. What would be the procedure using that particular tool? Ken: Sure. At its most basic, what you'd be looking to do, let's say you're looking at your home WiFi network. Basically, we need to make sure your WiFi is nice and safe. And security of a WiFi key is how long and complex it is. It's very easy to grab an encrypted hash of your WiFi key by sitting outside with a WiFi antenna and a tool like Aircrack, which allows you to grab the key. What we then want to do is try and crack that offline. So once I've got your WiFi key, I'm on your network, and we find in a lot of cases that ISP WiFi routers, the default passwords just aren't complicated enough. And we looked at some of the ISPs in the U.K. and discovered that some of the preset keys, we could crack them on relatively straight-forward equipment in as little as a couple of days. IOS: Okay. That is kind of mind-blowing because I was under the impression that those keys were encrypted in a way that would make it really difficult to crack. Ken: Yeah, you hope so but, again, it comes down to the length and complexity of the key. If you WiFi network key is only say -- I don't know — eight characters long and it's not really going to stand up to a concerted attack for very long. So again, length and complexity is really important. IOS: Yeah, actually we do see the same thing in the enterprise world and one of the first recommendations security pros make is the keys have to be longer and the passwords have to be longer than at least 8. Ken: We've been looking at some ... there's also the character set as well. We often find … the WiFi router often might only have lower case characters and maybe some numbers, and those numbers and characters are always in the same place in the key. And if you know where they are and you know they're always going to be lower case, you've reduced the complexity. IOS: Right. Ken: So I'd really like to be seeing 12-, 15-, 20-character passwords. It's not a difficult thing. Every time you get a new smartphone or a new tablet, you have to go and get it from the router then but really I think people can cope with longer passwords that they don't use very often, don't you think? IOS: No, I absolutely agree. We sort of recommend, and we've written about this, that you can...as an easy way to remember longer passwords, you can make up a mnemonic where each letter becomes part of a story. I don't know if you've heard of that technique. You can get a 10-character password that's easy to remember and therefore becomes a lot harder to decrypt. We've also written a little bit about some of the decrypting tool that are just easily available, and I think you mentioned one of them. Was it John the Ripper? Ken: John is a password brute force tool and that's really useful. That's great for certain types of passwords. There are other tools for doing different types of password hashes but John is great. Yeah, it's been around for years. IOS: It's still free. Ken: But there are lots of other different types of tools that crack different types of password. IOS: Okay. Do you get the sense that, just going back to some of these vendors who are making these devices, I think you said that they just probably are not even thinking about it and perhaps just not even aware of what's out there? Ken: Yeah, let's think about it. The majority of start-up entrepreneur organizations that are trying to bring a new IoT device to market, they've probably got some funding. And if they're building something, it's probably going to be going into production nine months ahead. Imagine you've got some funding from some investors, and just as you're about to start shipping, somebody finds a security bug in your product! What do you do? Do you stop shipping and your company goes bust? Or do you carry on and trying to deal with the fallout? I do sympathize with these organization, particularly if they had no one giving them any advice along the way to say, "Look, have you thought about security?" Because then they're backed into a corner. They've got no choice but to ship or their business goes bankrupt, and they've got no ability to fix the problem. And that’s probably what happened with the guys who made the WiFi kettle. Some clever guys had a good idea, got themselves into a position where they were committed, and then someone finds a bug and there's no way of backing out of shipping. IOS: Right, yeah. Absolutely all true. Although we like to preach something called Privacy by Design — at least it’s getting a lot more press than it did a couple years ago — which is just the people at the C-level suite should just be aware that you have to start building some of these privacy and security ideas into the software. Although it's high-sounding language. And you're right, when it comes to it, a lot of companies, especially start-ups, are really going to be forced to push these products out and then send out an update later, I guess is the idea. Or not. I don't know. Ken: That's the chance, isn't it? So if you look at someone like Tesla, they've had some security bugs found last year and they have the ability to do over-the-Internet updates. So the cars can connect over WiFi and all their security bugs were fixed over the air in a two-week period! I thought that was fantastic. So they can update in the field ... if you figured out that, brilliant. But they don't have the ability to do updates once they're in the field. So then you end up in a real stick because you've got products you can only fix by recalling, which is a huge cost and terrible PR. So hats off to Tesla for doing it right. And the same goes for the Ring doorbell. The guys thought about it. They had a process whereby it got the updates really, really easy, it's easy to fix, and they updated the bug that we found within about two weeks. And that's the way it should be. They completely thought about security. They knew they couldn't be perfect from the beginning. "Let's put a cable in place, a mechanism, so we can fix anything that gets found in the field." IOS: Yes. We're sort of on the same page. Varonis just sees the world where there will always be a way for someone to get into especially newer products and you have to have secondary defenses. And you've talked about some good remediations with longer passwords, and another one we like is two-factor authentication. Any thoughts on biometric authentication? Ken: Yes. Given the majority of IoT devices have being controlled by a smartphone, I think it's really key for organizations to think about how they've authenticated the customer to a smart device or, if they have a web app, the web interface as well, how they authenticate the customer to that. I'm a big fan of two-factor authentication. People get their passwords stolen in breaches all the time. And because they will reuse their passwords across multiple different systems, passwords stolen from one place and you find another place gets compromised. There was a great example, I think, some of the big data breaches ... they got a password stolen in one breach and then someone got their account hacked. It wasn't hacked. They just had reused the password! IOS: Right. Ken: So I'm a real fan of two-factor authentication to prevent that happening. Whether it's a one-time SMS to your phone or a different way of doing it, I think two-factor authentication is fantastic for helping Average Joe deal with security more easily. No one's going to have an issue with, "Look, you've sent me an SMS to my phone". That's another layer of authentication. Great. Fantastic." I'm not so much a fan of biometrics by themselves and the reason for that is my concern about revocation. Just in case the biometric data is actually breached, companies get breached all the time, we've not just lost passwords because passwords we throw them away, we get new ones, but if we lose your biometic, we're in a bit more of a difficult position. But I do biometrics work brilliantly when they're combined with things like passwords. Biometric plus password is fantastic as a secure authentication. IOS: Thanks for listening to the podcast. If you're interested in following Ken on Twitter, his handle is TheKenMunroShow or you can follow his blog at PenTestPartners.com. Thanks again.
Changing Finder view defaults, managing iOS 9 email accounts, RAID in El Capitan and much more are covered by your two favorite geeks today. Subscribe or simply press Play to enjoy! Sponsor: Carbon Copy Cloner has been helping you create bootable backups of your Mac since 2002. Now with SafetyNet, […]
In this episode we're talking wireless and mobility and what that means to the Wifi backbone we all take for granted as we wander all over our offices or workplace campuses on whatever devices we have handy. I’m pleased to be joined by Christian Gilby, the Director of Product Marketing at Aruba Networks. Aruba has been a market leader on the cutting edge of wireless networking for years and this May they were acquired by HP. Take a listen to learn how companies need to adapt their wireless backbone to support enhance communications and collaboration going over Wifi.
In this podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications: Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.
Live from Mobile World Congress: Sandra Rivera, director of market development for Intel, comes to the show with insights on transforming mobile networks – taking the data center technologies that Intel provides a foundation in (cloud computing, virtualization, power management, etc.) and bringing them to mobile networks. Operators can take fixed function, proprietary networks and apply controls for things like power management (shutting down a network when not in use). For more information, visit www.intel.com/mwc.
Speaker: Prof. L. Tassiulas Abstract: Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In all cases the available other node information might be used to effectively increase the efficiency of the information delivery process. We will consider first an information theoretic perspective and present a scheme that exploits the opportunistically available overheard information to achieve the Shannon capacity of the broadcast erasure channel. Then we will consider information transport in a multi-hop flat wireless network and present schemes for spatial information replication based on popularity, in association with any-casting routing schemes, that achieve asymptotically optimal performance.
Speaker: Prof. L. Tassiulas Abstract: Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In all cases the available other node information might be used to effectively increase the efficiency of the information delivery process. We will consider first an information theoretic perspective and present a scheme that exploits the opportunistically available overheard information to achieve the Shannon capacity of the broadcast erasure channel. Then we will consider information transport in a multi-hop flat wireless network and present schemes for spatial information replication based on popularity, in association with any-casting routing schemes, that achieve asymptotically optimal performance.
Speaker: Dr. M. A. Chaudry Abstract: Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networks; specifically we investigate the Index Coding problem. In wireless networks, each transmitted packet is broadcasted within a certain region and can be overheard by the nearby users. When a user needs to transmit packets, it employs the Index Coding that uses the knowledge of what the user's neighbors have heard previously (side information) in order to reduce the number of transmissions. The objective is to satisfy the demands of all the users with the minimum number of transmissions. With the Index Coding, each transmitted packet can be a combination of the original packets. The Index Coding problem has been proven to be NP-hard, and NP-hard to approximate. Noting that the Index Coding problem is not only NP-hard but NP-hard to approximate, we look at it from a novel perspective and define the Complementary Index Coding problem; where the objective is to maximize the number of transmissions that are saved by employing the Index Coding compared to the solution that does not involve coding. We prove that the Complementary Index Coding problem can be approximated in several cases of practical importance. We investigate both the multiple unicast and multiple multicast scenarios for the Complementary Index Coding problem for computational complexity, and provide polynomial time approximation algorithms.
Speaker: Dr. M. A. Chaudry Abstract: Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networks; specifically we investigate the Index Coding problem. In wireless networks, each transmitted packet is broadcasted within a certain region and can be overheard by the nearby users. When a user needs to transmit packets, it employs the Index Coding that uses the knowledge of what the user's neighbors have heard previously (side information) in order to reduce the number of transmissions. The objective is to satisfy the demands of all the users with the minimum number of transmissions. With the Index Coding, each transmitted packet can be a combination of the original packets. The Index Coding problem has been proven to be NP-hard, and NP-hard to approximate. Noting that the Index Coding problem is not only NP-hard but NP-hard to approximate, we look at it from a novel perspective and define the Complementary Index Coding problem; where the objective is to maximize the number of transmissions that are saved by employing the Index Coding compared to the solution that does not involve coding. We prove that the Complementary Index Coding problem can be approximated in several cases of practical importance. We investigate both the multiple unicast and multiple multicast scenarios for the Complementary Index Coding problem for computational complexity, and provide polynomial time approximation algorithms.
a wireless network is a great analogy for the way the Gifts of the Spirit work. we can access the resources of heaven at any time, using the same password and needing no "external device". listen to learn more about how to access and utilize the network of God's Kingdom whenever you want and wherever you are.
A new type of antenna uses plasma to focus radio waves and enable ultrafast wireless networks.
Speaker: Prof. M. Alanyali Abstract: This talk will touch on wireless coexistence issues that arise due to higher spatial density of spectrum usage. We consider a fairness perspective for autonomous scheduling of transmissions by distinct sessions, subject to constraints that are represented by a conflict graph. The emphasis is on randomized backoff-based CSMA algorithms. The resulting transmission dynamics is represented by a Markovian model whose analysis suggests practical challenges in fair sharing of spectrum by distinct sessions that subscribe to a common standard, as well as by those that do not possess a common signaling protocol.
Speaker: Prof. M. Alanyali Abstract: This talk will touch on wireless coexistence issues that arise due to higher spatial density of spectrum usage. We consider a fairness perspective for autonomous scheduling of transmissions by distinct sessions, subject to constraints that are represented by a conflict graph. The emphasis is on randomized backoff-based CSMA algorithms. The resulting transmission dynamics is represented by a Markovian model whose analysis suggests practical challenges in fair sharing of spectrum by distinct sessions that subscribe to a common standard, as well as by those that do not possess a common signaling protocol.
Quaritsch M., Wiesinger M., Strobl B., Rinner B.
Dave and John first offer some clarification on co-mingling wireless types on one network, then launch into some tips on upgrading both software and hardware. Then it's the listeners' turn, and we hear a few tips from all of you. Download, subscribe, press play, and enjoy! Show notes for Mac […]
First John and Dave start off with some general advice to help keep your geek status in good standing. Then it's off to creating and managing your Mac on more than one wireless network, including A, B, G, and N! Syncing your data makes a return to the discussion pool, […]
Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.
Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.