Podcasts about wireless networks

  • 66PODCASTS
  • 78EPISODES
  • 33mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Mar 8, 2024LATEST
wireless networks

POPULARITY

20172018201920202021202220232024


Best podcasts about wireless networks

Latest podcast episodes about wireless networks

The Six Five with Patrick Moorhead and Daniel Newman
Generative AI and the Network – Six Five In the Booth with IBM and Bell Canada

The Six Five with Patrick Moorhead and Daniel Newman

Play Episode Listen Later Mar 8, 2024 17:12


On this episode of The Six Five In the Booth, hosts Daniel Newman and Patrick Moorhead welcome Andrew Coward, General Manager, Software Networking at IBM and Mark McDonald, VP, Wireless Networks at Bell Canada at MWC 2024 for a conversation on how generative AI is being used in the networking landscape. Their discussion covers: The current state of wireless networking and what issues can be solved with AI How generative AI is currently used in networking and how will this change over time as the use of generative AI matures Thoughts from Andrew and Mark on how generative AI will transform both of their respective companies Click here to learn more about IBM's announcements at MWC.

5G Guys I Tech Talks
56. Exploring Private Wireless Networks with Jeff Hipchen

5G Guys I Tech Talks

Play Episode Listen Later Jan 30, 2024 32:44


In this episode of the 5G Guys podcast, hosts Dan McVaugh and Wayne Smith explore private wireless networks with guest Jeff Hipchen, a Principal of RF Connect. They discuss how private wireless networks are utilized differently, giving examples in healthcare, professional sports, and higher education sectors. Hipchen emphasizes that private networks allow businesses to control their destiny as they allow the customization and security not offered by public networks. He also highlights how these networks supplement existing services like Wi-Fi and address capacity issues caused by the ever-growing number of devices and applications in use. Lastly, he touches on the potential for even smaller enterprises to improve connectivity.   __________________________ Connect With Our Guest __________________________      RF Connect Website ➡︎ https://www.rfconnect.com/      Jeff Hipchen Email ➡︎ jdh@rfconnect.com   __________________________ Connect With Our Sponsor __________________________      Vertex Innovations ➡︎ https://vertex-us.com/   __________________________ Connect With Us __________________________      5G Guys Website ➡︎  https://5gguys.com        Social:        ·       Facebook: https://www.facebook.com/5Gguys      ·       LinkedIn: https://www.linkedin.com/groups/12515882      ·       X: https://twitter.com/5gGuys   _______________________________ Submit Your Ideas or Feedback ➡︎ https://5gguys.com/contact-2 _______________________________ Subscribe to the 5G Guys Weekly Newsletter ➡︎ https://mailchi.mp/5gguys/subscribe-to-the-5g-guys _______________________________ ⏰Episode Minute-by-Minute⏰   00:00 Introduction 00:29 Welcome to the 5G Guys Podcast 01:07 Introducing the Guest: Jeff Hipchen 01:56 The History of RF Connect 03:10 The Evolution of Wireless Networks 10:03 The Shift to Private Networks 11:03 The Benefits of CBRS for Private Networks 13:04 Sponsor Break: Vertex Innovations 13:32 Public Carriers' View on Private Networks 16:00 Examples of Private Network Deployments 21:48 The Role of 4G and 5G in Private Networks 24:14 The Coexistence of Wi-Fi, Public Cellular, and Private Networks 29:36 The Future of Small Venue Solutions 29:43 The Potential of Moken for Private Networks 31:48 Conclusion and Contact Information 32:26 Outro

University of California Audio Podcasts (Audio)
Using AI to Build Better Wireless Networks with Tara Javidi

University of California Audio Podcasts (Audio)

Play Episode Listen Later Jan 15, 2024 28:31


Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]

Science (Video)
Using AI to Build Better Wireless Networks with Tara Javidi

Science (Video)

Play Episode Listen Later Jan 15, 2024 28:31


Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]

Science (Audio)
Using AI to Build Better Wireless Networks with Tara Javidi

Science (Audio)

Play Episode Listen Later Jan 15, 2024 28:31


Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]

UC San Diego (Audio)
Using AI to Build Better Wireless Networks with Tara Javidi

UC San Diego (Audio)

Play Episode Listen Later Jan 15, 2024 28:31


Tara Javidi, an Electrical and Computer Engineering professor at UC San Diego's Jacobs School of Engineering discusses her research in artificial intelligence and large scale wireless networks. Series: "Science Like Me" [Science] [Show ID: 39163]

All Things 5G
Energy Efficiency in Wireless Networks

All Things 5G

Play Episode Listen Later Nov 20, 2023 25:26


The bad news is that wireless communications consumes a lot of power. The good news is that there is a lot of opportunity for improving the energy efficiency of wireless networks.

energy efficiency wireless networks
Sports Geek - A look into the world of Sports Marketing, Sports Business and Digital Marketing
Extenet - How Private Wireless Networks can unlock options for your venue - Sports Geek Amplify

Sports Geek - A look into the world of Sports Marketing, Sports Business and Digital Marketing

Play Episode Listen Later Jun 9, 2023 31:45


In this Sports Geek Amplify episode, Jeff Alexander, SVP Field Operations at Extenet, explains how private wireless networks can help sports stadiums meet the growing technology demands. To learn more, visit SportsGeekAmplify.com/Extenet

private options geeks unlock amplify venue wireless networks jeff alexander sports geek
InfosecTrain
Introduction to Wireless Networks | Types of Wireless Encryption | Wireless Hacking Tools

InfosecTrain

Play Episode Listen Later Apr 11, 2023 89:53


InfosecTrain hosts a live event entitled “Cybersecurity Foundation Course” with certified experts Mr. Rishabh Kotiyal. Thank you for watching this video, For more details or free demo with our expert write into us at sales@infosectrain.com ➡️ Agenda for the Webinar

types encryption wireless networks hacking tools
On Point
How to make America's wireless networks more reliable

On Point

Play Episode Listen Later Apr 5, 2023 47:24


T-Mobile had a major cell phone outage in February. Last year, AT&T customers in Minnesota lost service for four days. What would it take to make America's wireless networks more reliable? Harold Feld joins Meghna Chakrabarti.

america minnesota att reliable t mobile make america wireless networks meghna chakrabarti harold feld
Guy's Guy Radio with Robert Manni
#556 Best Selling Author Marc J. Seifer

Guy's Guy Radio with Robert Manni

Play Episode Listen Later Mar 16, 2023 55:00


Dr. Marc Seifer is the preeminent authority on the life and times of Nikola Tesla as evidenced through his exhaustively researched best seller: Wizard. Dr. Seifer 's wide ranging and meticulously researched published articles, novels and books span subjects ranging from metaphysics, behavior analysis to science fiction. Besides his authoring, he is a forensic expert and published master of handwriting analysis. Join Robert Manni, author of The Guys' Guy's Guide To Love as we discuss life, love and the pursuit of happiness. Subscribe to Guy's Guy Radio on YouTube, iTunes and wherever you get your podcasts! Buy The Guys' Guy's Guide to Love now!

Guy's Guy Radio
#556 Best Selling Author Marc J. Seifer

Guy's Guy Radio

Play Episode Listen Later Mar 16, 2023 55:00


Dr. Marc Seifer is the preeminent authority on the life and times of Nikola Tesla as evidenced through his exhaustively researched best seller: Wizard. Dr. Seifer 's wide ranging and meticulously researched published articles, novels and books span subjects ranging from metaphysics, behavior analysis to science fiction. Besides his authoring, he is a forensic expert and published master of handwriting analysis. Join Robert Manni, author of The Guys' Guy's Guide To Love as we discuss life, love and the pursuit of happiness. Subscribe to Guy's Guy Radio on YouTube, iTunes and wherever you get your podcasts! Buy The Guys' Guy's Guide to Love now!

ALYNMENT - Connecting Tech to Biz
Ep # 39: Maximizing Business Outcomes with Converged Wireless Networks - with Jason Inskeep, AT&T

ALYNMENT - Connecting Tech to Biz

Play Episode Listen Later Mar 8, 2023 34:15


4G and 5G cellular networks are becoming increasingly popular amongst enterprises as more organizations look for ways to accelerate their digital strategy. However, many challenges come with private cellular networks, such as finding the right solution that meets business application needs, its cost-effectiveness, security, reliability, and scalability. How do those challenges differ across verticals and use cases and what are the critical success factors for the day-1 and, more importantly, day-2 operations of the private cellular network? Let's find out. Our guest for this podcast is Jason Inskeep, Assistant Vice President at AT&T for the 5G Center of Excellence, focusing on private cellular and the Edge.  In our discussion today, we will uncover a few things, such as:  -       The challenges business face in adopting private wireless technologies.-       How public and private cellular can co-exist and complement each other.-       Where the momentum is now in private cellular networks.-       Where the gaps are between enterprise needs and the telecom sector.  -       How  CIOs should rethink wireless network strategy to meet their emerging digital automation needs.So, let us welcome Jason Inskeep. 

RCR Wireless News
INS & Nokia: Accelerating Industry 4.0 digitalization with critical wireless networks

RCR Wireless News

Play Episode Listen Later Feb 21, 2023 14:27


Industry 4.0 technologies such as IoT, Artificial Intelligence (AI), extreme automation and digital twins indisputably provide significant benefits to many enterprises, including increased productivity, greener operations and enhanced worker safety. Yet, many industrial sites may appear difficult to digitalize. From rock quarries and mining pits to factories, warehouses and chemical plants, achieving ubiquitous connectivity that securely and reliably powers all people, machines and devices in complex, dynamic and often harsh environments has proven challenging in the past. With the paradigm shift brought by flexible, high-performance private wireless networks these challenges are no longer a concern of enterprises. Tune in to hear Joel Albert, VP of Services for Industrial Networking Solutions, and Jim Connor, Partner Sales Manager at Nokia discuss how to accelerate Industry 4.0 digitalization for your operations.

The Art of Network Engineering
Ep 111 – Wireless Networks

The Art of Network Engineering

Play Episode Listen Later Feb 1, 2023 75:16


In this episode, we talk wireless network with Rowell Dionicio, from  @ClearToSend ! More from Rowell: Twitter: https://twitter.com/rowelldionicio Website: https://rowelldionicio.com/ Clear to Send: Twitter: https://twitter.com/cleartosend YouTube: https://www.youtube.com/@ClearToSend Website: https://www.cleartosend.net/ Check out our Patreon – https://www.patreon.com/artofnetengFollow us on Twitter https://twitter.com/artofneteng​Follow us on Instagram https://www.instagram.com/artofneteng/​Like us on Facebook https://www.facebook.com/artofnetengJoin the group on LinkedIn https://www.linkedin.com/company/artofneteng/Check out our website https://artofnetworkengineering.com​MerchContinue reading "Ep 111 – Wireless Networks"

clear networks wireless wireless networks rowell dionicio
Science Rehashed
At-home healthcare: monitoring Parkinson's disease with radio waves

Science Rehashed

Play Episode Listen Later Nov 16, 2022 38:51


The prevalence of Parkinson's disease has grown more than 50% in recent years, and early onset diagnosis is increasing at an even faster rate. Due to its slow, subtle progression and variable response to medications, this condition can be difficult for clinicians to manage. The work of Dr. Dina Katabi, Director of the MIT Center for Wireless Networks and Mobile Computing, may change that. Her team has shown that discrete, radio wave emitting devices in the home can be used to track patient movement and health parameters like sleep quality. In this episode, Dr. Katabi explains how this work will make healthcare more precise and accessible than ever before. Music Credits: “Land of the midnight sun” and “I hope you hear this” by Rukudzo.

The CannaTech Group
Wireless Networks at the Grow Level

The CannaTech Group

Play Episode Listen Later Nov 1, 2022 11:49


GUEST: Alex Wilson, Collabsion, Inc.HOST: Harry Brelsford, The CannaTech Group The cannabis industry is a huge industry with an estimated global value of 27.7 billion USD and growing daily.  With the industry expanding into other industries many cannabis businesses are turning to technology to help drive growth, increase safety and security, as well as streamline processes to increase productivity.  Although, many cannabis businesses are turning to technology some are struggling with availability due to location.  Many farmers who want to use harvesting technologies are struggling to access Wi-Fi allowing them to use the technologies available.  Harry Brelsford of the CannaTech Group sits down with Alex Wilson of Collabsion, Inc. to discuss Wi-Fi networking in remote locations.Watch the Interview @ TheCannaTechGroup.com

The BOM
Decentralized Wireless Networks w/ Clarissa Redwine

The BOM

Play Episode Listen Later Sep 14, 2022 41:02 Transcription Available


Today, we're joined by Clarissa Redwine. When I first met Clarissa back in 2017, she was the West Coast Design and Tech outreach lead for Kickstarter. She's also an NYU Law Fellow focused on open source hardware and is now the Grant's Program Manager at Helium, a wireless network that's working to build a decentralized telecom.You can follow @Supplyframe and @Hackaday on Instagram, LinkedIn, YouTube, and Twitter, and @SupplyframeDesignLab on Instagram and Twitter. The BOM is a Supplyframe podcast hosted by Majenta Strongheart, written, produced, and edited by Frank Driscoll and co-edited by Daniel Ferera. Executive producers are Ryan Tillotson and Tyler Nielsen. Theme music is by Ana Hogben, with show art by Thomas Schneider. Special thanks to Giovanni Salinas, Bruce Dominguez, Thomas Woodward, Jin Kumar, Jordon Clark, Matt Gunn, the entire Supplyframe Team, and you, our wonderful listeners.

tech executives kickstarter program managers bom decentralized helium red wine wireless networks hackaday matt gunn ryan tillotson tyler nielsen
The Wolf Of All Streets
Helium Blockchain: Decentralizing Wireless Networks, True Crypto Adoption | Amir Haleem

The Wolf Of All Streets

Play Episode Listen Later Aug 2, 2022 23:57


Amir Haleem, Founder of Helium, talks about his plans to build “The People's Network” - a decentralized, wireless network powered by blockchain that could wrap the entire globe, forever changing the Telecom Industry. Helium allows users to simply plug in a hotspot, join the network, and earn Helium's token, HNT, as a reward. Amir shares how this innovative business model allowed his company to go from 0 to 1,000,000 nodes in less than 3 years, how Helium will continue to scale, and what hurdles they'll have to jump along the way. JOIN THE FREE WOLF DEN NEWSLETTER

Cisco Champion Radio
S9|E21 Cisco AI-Enhanced Radio Resource Management for Wireless Networks

Cisco Champion Radio

Play Episode Listen Later May 31, 2022 37:26


Your network works for you. Your network has all the data it needs to make it a better network. However, with people coming and going, your network environment becomes a living and breathing entity that is dynamic based on the number of users, the demand for bandwidth and other environmental changes that happen over time. If your network does not adjust to these changes, performance suffers for all devices including IoT and user devices. A solution is needed that continually monitors and optimizes the network to these changes providing the best operational efficiency. Tune in to this episode to learn how Cisco has optimized RRM, leveraging Artificial Intelligence to adaptively optimize your wireless network. As a part of Cisco DNA Center AI-Enhanced RRM uses historical data, AP density and other trends to provide the best wireless experience in a dynamic environment. Related links https://cisco.com/go/dnacenter.com/?dtid=opdcsnc001469 Follow us: twitter.com/CiscoChampion Cisco Champion Hosts Kjetil Teigen Hansen (twitter.com/mrTeigen), Conscia Norge AS, System Engineer Mike Bolitho (twitter.com/NetEngMike), CommonSpirit Health, Wireless Engineer Richard Atkin (twitter.com/ukricha), ITGL, Solution Architect Guest Jim Florwick, Cisco, Technical Marketing Engineer, ENB TME Platforms Moderator Amilee San Juan (twitter.com/amileesan1), Cisco, Customer Voices and Cisco Champion Program

Switching, Routing, and Wireless Essentials with KevTechify on the Cisco Certified Network Associate (CCNA)
Introduction to Wireless - WLAN Concepts - Switching, Routing, and Wireless Essentials - CCNA - KevTechify | Podcast 42

Switching, Routing, and Wireless Essentials with KevTechify on the Cisco Certified Network Associate (CCNA)

Play Episode Listen Later Apr 2, 2022 19:44


In this episode we are going to look at Introduction to Wireless.We will be discussing Benefits of Wireless, Types of Wireless Networks, Wireless Technologies, 802.11 Standards, Radio Frequencies, and Wireless Standards Organizations.Thank you so much for listening to this episode of my series on Switching, Routing, and Wireless Essentials for the Cisco Certified Network Associate (CCNA).Once again, I'm Kevin and this is KevTechify. Let's get this adventure started.All my details and contact information can be found on my website, https://KevTechify.com-------------------------------------------------------Cisco Certified Network Associate (CCNA)Switching, Routing, and Wireless Essentials v2 (SRWE)Episode 12 - WLAN ConceptsPart A - Introduction to WirelessPodcast Number: 42-------------------------------------------------------Equipment I like.Home Lab ►► https://kit.co/KevTechify/home-labNetworking Tools ►► https://kit.co/KevTechify/networking-toolsStudio Equipment ►► https://kit.co/KevTechify/studio-equipment 

Okay, Computer.
Of Trash Pandas and Decentralized Wireless Networks with Amir Haleem

Okay, Computer.

Play Episode Listen Later Feb 16, 2022 60:35


Okay, Computer. co-hosts Dan Nathan, Rick Heitzmann and Meltem Demirors discuss the Twitter buyback (9:17), Tik Tok (17:36), and private market valuations (26:12). Later, Dan and Rick interview Amir Haleem, Founder and CEO of Helium Systems, and talk about decentralized telecom applications (34:40).  ---- Email us at contact@riskreversal.com with any feedback, suggestions, or questions for us to answer on the pod and follow us @OkayComputerPod. We're on social: Follow Dan Nathan @RiskReversal on Twitter Follow @GuyAdami on Twitter Follow us on Instagram @RiskReversalMedia Subscribe to our YouTube page

On The Tape
OK, Computer 2/16/22: Of Trash Pandas and Decentralized Wireless Networks with Amir Haleem

On The Tape

Play Episode Listen Later Feb 16, 2022 61:12


Okay, Computer. co-hosts Dan Nathan, Rick Heitzmann and Meltem Demirors discuss the Twitter buyback(9:17), Tik Tok (17:36), and private market valuations(26:12). Later, Dan and Rick interview Amir Haleem, Founder and CEO of Helium Systems, and talk about decentralized telecom applications (34:40).  ---- Email us at contact@riskreversal.com with any feedback, suggestions, or questions for us to answer on the pod and follow us @OkayComputerPod. We're on social: Follow Dan Nathan @RiskReversal on Twitter Follow @GuyAdami on Twitter Follow us on Instagram @RiskReversalMedia Subscribe to our YouTube page

All Day Digital
All Day Digital S1E03: The Emerging Role of Private Wireless Networks

All Day Digital

Play Episode Listen Later Jan 11, 2022 26:10


Private wireless networks have the potential to deliver significant benefits for schools, businesses and other organizations throughout rural America, while helping to bridge the digital divide. In this episode, CoBank's Jeff Johnston speaks with Tim Courtney, vice president of sales and strategy at Further Enterprise Solutions, to discuss the emerging role of private wireless networks. Listen to their conversation for insights on how the availability of the CBRS band is enabling smaller organizations to build carrier-grade wireless networks at a reasonable cost.

KNX In Depth
KNX In Depth: New data on omicron shows we still don't really know what we're dealing with -- 5G wireless networks, great for smartphones but bad for airlines -- 2021 produced some great movies, but no audiences to see them

KNX In Depth

Play Episode Listen Later Dec 18, 2021 41:57


On the menu for today's show:Is omicron going to spoil your holidays? There's lot of new data out today and much of it is conflicting -- so we'll try to get to the bottom of what we know, and what we still don't know.Pfizer makes changes to its COVID vaccine clinical trial in kids under the age of 5, after it finds that two doses aren't doing the trick.And the FDA eases access to an abortion pill that might turn the entire reproductive rights debate on its head.5G wireless is coming -- and while it might be a really good thing for your phone -- it might be really bad for the airline industry.2021 for Hollywood ... good movies ... but still a poor showing in terms of the audience in theatres. And: would you turn your dead relative or friend into an artificial intelligence program...........that you could continue to talk with years after they're gone? To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

KNX In Depth
KNX In Depth: New data on omicron shows we still don't really know what we're dealing with -- 5G wireless networks, great for smartphones but bad for airlines -- 2021 produced some great movies, but no audiences to see them

KNX In Depth

Play Episode Listen Later Dec 18, 2021 44:41


On the menu for today's show: Is omicron going to spoil your holidays? There's lot of new data out today and much of it is conflicting -- so we'll try to get to the bottom of what we know, and what we still don't know. Pfizer makes changes to its COVID vaccine clinical trial in kids under the age of 5, after it finds that two doses aren't doing the trick. And the FDA eases access to an abortion pill that might turn the entire reproductive rights debate on its head. 5G wireless is coming -- and while it might be a really good thing for your phone -- it might be really bad for the airline industry. 2021 for Hollywood ... good movies ... but still a poor showing in terms of the audience in theatres.  And: would you turn your dead relative or friend into an artificial intelligence program...........that you could continue to talk with years after they're gone? Learn more about your ad choices. Visit podcastchoices.com/adchoices

POP
Investing in Decentralized Wireless Networks with Micha Benoliel, Co-Founder and CEO of Nodle

POP

Play Episode Listen Later Dec 8, 2021 39:15


Micha Benoliel is the co-founder and CEO of Nodle, a decentralized wireless network connecting IoT devices to the internet. We discuss how Nodle is building the world's largest eco-friendly wireless network to connect and secure the internet of things. Tune in to learn more.Before founding Nodle, Micha enabled Skype to launch Skype In And Skype Out. He also built FireChat, the first decentralized messaging app leveraging the peer-to-peer mesh technology.Micha also shares his thoughts on Web3 and the future of decentralized connectivity, plus its exciting implications. Key points discussed- Investing in decentralized wireless networks (00:00)- Micha's backstory and how Nodle came to be (01:41)- The practical applications of decentralized networks (06:02)- How does a decentralized network differ from a wireless network? (08:22)- How you can profit by joining a decentralized network (10:52)- The top challenges Nodle faces today (17:00)- The exciting implications of decentralized connectivity (21:06)- Why the future of Web3 looks so promising (29:15)- Bringing profit back to the people (37:28) Additional resourcesLearn more about Nodle and their work here:https://www.nodle.com/Nodle Parachain: parachain.nodle.comNodle Cash app: Nodle.cashTo keep in the loop for the latest developments in crowdfund investing, make sure to follow this podcast and listen in every week. Leave a rating and a review, and let's bring profit back to the people together.Ready to start investing in your future? Then head over to www.republic.co and find a startup you're passionate about.Legal Disclaimer: The Securities and Exchange Commission (SEC) has qualified the offering statement that we have filed with the SEC. The information in that offering statement is more complete than the information we are providing now and could differ in important ways. You must read the documents filed with the SEC before investing. The offering is being made only by means of its offering statement. This document shall not constitute an offer to sell or the solicitation of an offer to buy, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction. An indication of interest involves no obligation or commitment of any kind. Any person interested in investing in any offering of Props Tokens should review our disclosures and the publicly filed offering statement and the final offering circular that is part of that offering statement at http://offeringcircular.propsproject.com. YouNow is not registered, licensed or supervised as a broker-dealer or investment adviser by the Securities and Exchange Commission (SEC), the Financial Industry Regulatory Authority (FINRA), or any other financial regulatory authority or licensed to provide any financial advice or services.

Tower Talks with Inside Towers
#92 - 3 Questions with Johnny Broadband - Private Wireless Networks with JMA Wireless & Druid Software

Tower Talks with Inside Towers

Play Episode Listen Later Nov 9, 2021 30:16


The notion of private wireless networks has gained prominence with concepts such as Industry 4.0, smart cities, campus networks, and Enterprise IT/OT integration and critical communications.Private wireless networks are enabled by cost-effective, open-standard radio and core equipment that can be programmed for specific user needs, built to 4G and 5G specifications, and having access to shared-spectrum such as CBRS or dedicated licenses.What is a private network, which vertical markets are candidates, and what does it take to build and operate such networks?John Celentano, Inside Towers Business Editor discusses opportunities for private wireless network adoption with Todd Landry, Corporate Vice President, Product & Market Strategy at JMA Wireless and Mick O'Dwyer, Sales & Marketing Director at Druid Software.Support the show (https://insidetowers.com/subscription/)

5G Guys I Tech Talks
13. What You Need To Know About Private Wireless Networks

5G Guys I Tech Talks

Play Episode Listen Later Sep 29, 2021 26:43


Whether you're a business owner, educator, or even just a person who is connected to the world there is no doubt that wireless technology has become a necessity. Dubbed the fourth utility, it's clear that popular wireless networks are becoming crowded and more at risk of security breaches. If you've ever felt like you were at the mercy of your wireless network provider then this episode is for you.  Welcome back to 5G Guys! In today's episode, we go over private wireless networks, why they were created, how they work, and what they are being used for. While wireless networks are something that most people rely on for work and business, private wireless offers many possibilities that can increase your efficiency, up your security, and even improve your productivity. We talk about how businesses are innovating with their own private wireless networks and how you can get ahead of the curve in your own life.  Join us as we talk about why private wireless networks were created and how you can take advantage of this opportunity. You'll get a look into how private wireless networks have been used so far, from communication between land and sea to offering a solution for educators in a pandemic. You'll learn about the spectrum of CBRS and how it's helped create simple solutions to otherwise difficult problems. As well as the flexibility and control you have within your own private wireless network. While the idea of creating a private wireless network can seem daunting we encourage you to hit play, sit back, and relax. Don't wait for your wireless network provider to become unreliable, stay one step ahead and learn what private wireless networks can do for you.  For more resources or to connect with us, check out the links below!  More Of What's Inside: What a private wireless network is  Taking back your network control Upping security with a private network  CBRS and why it was built Creating a spectrum with no interference Moving past the capabilities of wifi Bringing 4g and 5g into private networks How private wireless networks have helped education Having two phones inside of one Eliminating operational expenses with your own private network And much more!     LINKS: Website:   Website: https://5gguys.com   Social:   Facebook: https://www.facebook.com/5Gguys LinkedIn: https://www.linkedin.com/groups/12515882 Twitter: https://twitter.com/5gGuys   Submit Your Ideas or Feedback: https://5gguys.com/contact-2   Episode Minute By Minute: 0:23 - What we cover today 2:30 - Why you need a private network 6:17 - CBRS and what it means to you 10:50 - How companies have wanted to use private networks 15:22 - Private networks and school districts 18:56 - Dual SIM cards and security advancements 22:52 - Saving money and making the right fit for you 25:41 - Closing thoughts

moving saving private eliminating dubbed upping wireless networks cbrs dual sim episode minute by minute
Consumer Tech Update
Massive wireless networks ... that we're paying for

Consumer Tech Update

Play Episode Listen Later May 17, 2021 1:34


Amazon and Apple are each working towards one goal: A large-scale wireless network that doesn’t need Wi-Fi or cellular. We will spend money on their phones, cameras, trackers and more to create the network for them. It’s genius. Learn more about your ad choices. Visit megaphone.fm/adchoices

Consumer Tech Update
Massive wireless networks ... that we're paying for

Consumer Tech Update

Play Episode Listen Later May 17, 2021 1:34


Amazon and Apple are each working towards one goal: A large-scale wireless network that doesn’t need Wi-Fi or cellular. We will spend money on their phones, cameras, trackers and more to create the network for them. It’s genius. Learn more about your ad choices. Visit megaphone.fm/adchoices

Kelly Cutrara
CRTC will allow small carriers to piggyback on "Big 3" wireless networks

Kelly Cutrara

Play Episode Listen Later Apr 16, 2021 7:09


Kelly talks to Michael Geist, internet and e-commerce law expert at the university of Ottawa See omnystudio.com/listener for privacy information.

Business Minds
CONCERNS OVER CHINA'S INVOLVEMENT IN 5G WIRELESS NETWORKS

Business Minds

Play Episode Listen Later Jan 8, 2021 4:45


America and the rest of the world have many concerns over China and its involvement in 5G wireless networks. Here, we discuss those concerns and how we plan to deal with any problems as a country. --- Support this podcast: https://podcasters.spotify.com/pod/show/businessmindspodcast/support

america china concerns 5g involvement wireless networks 5g wireless
The SMT Wireless Report
T-Mobile, Verizon & AT&T: All Wireless Networks are not created equal, which have good rural coverage? (S2 E25)

The SMT Wireless Report

Play Episode Listen Later Nov 30, 2020 35:41


Recently, I tested a stretch of rural Ohio. I tested all 3 major wireless providers. I share my experience and test results. (S2 E25) --- Send in a voice message: https://anchor.fm/smtreport/message

Zeroing In
Zeroing In with Prof. B.S. Manoj | On Wireless Networks and Communication

Zeroing In

Play Episode Listen Later Oct 16, 2020 36:29


In an era where computers and networks are inseparable parts of our lives, would you dare to imagine what these ideas might have looked like a few decades ago when they were nothing but idealistic concepts? We discussed the realities and challenges of that world further with Prof. B.S. Manoj who experienced this revolution first hand from a scientific perspective, and continues to create and engage deeply with the futuristic ideas at present. From the Internet and wireless networks, through cellular data networks, to the internet of things and even quantum computing — his ideas of research and expertise span vast and wide. Dive in to hear about his fascinating journey into science and the pioneering research work that he undertakes in the exciting field of networking and communication! The team for Zeroing In for this episode included Ansuman Palo, Fenil Shah, Shreya Mishra, Manish Chauhan, Prajwal Patnaik, KVNG Vikram and Naman Jain. Featured artwork for the episode cover courtesy of Akshita Arora. Zeroing In season's theme song featured herewith, 'Longing', created by Ethan Phangcho.

The SMT Wireless Report
T-Mobile could hurt the future of all wireless networks, mmWave continues to blossom! (S2 E15)

The SMT Wireless Report

Play Episode Listen Later Sep 19, 2020 33:50


T-Mobile could hurt the future of all wireless networks, mmWave continues to blossom! (S2 E15) --- Send in a voice message: https://anchor.fm/smtreport/message

AP Audio Stories
Pentagon offers military airwaves for 5G wireless networks

AP Audio Stories

Play Episode Listen Later Aug 11, 2020 1:32


military offers pentagon airwaves wireless networks 5g wireless
Chain Reaction
Anatoly, Maya and Ryan: Experts Discuss The Parallels Between Crypto and Wireless Networks

Chain Reaction

Play Episode Listen Later Jun 25, 2020 72:49


Hosts Tom Shaughnessy sits down with Anatoly Yakovenko, Maya Zehavi and Ryan Gentry for a wide reaching discussion on the parallels between the wireless industry and crypto. From how Wireless technologies played out on a geographic basis, to narrative changes and where value accrued, there are clear comparisons between the two industries. I was thrilled to have on a group of wireless experts turned crypto experts!  - Twitter: Anatoly's Twitter: https://twitter.com/aeyakovenko Maya's Twitter: https://twitter.com/mayazi Ryan's Twitter: https://twitter.com/RyanTheGentry Tom's Twitter: https://twitter.com/Shaughnessy119 Chain Reaction Twitter: https://twitter.com/chainpodcast Support The Show Thank you to our sponsor AltoIRA for making this happen! Visit Altoira.com/Chainreaction for more information! Our Video interviews Can Be Viewed Here: https://youtu.be/fubeSokngY8 Access Delphi's Research Here: https://www.delphidigital.io/ Disclosures: This podcast is strictly informational and educational and is not investment advice or a solicitation to buy or sell any tokens or securities or to make any financial decisions. Do not trade or invest in any project, tokens, or securities based upon this podcast episode. The host may personally own tokens that are mentioned on the podcast. Tom Shaughnessy owns tokens in ETH, BTC, CKB, MLN, SNX, RUNE, BNT, and HNT. Lets Talk Bitcoin is a distribution partner for the Chain Reaction Podcast, and our current show features paid sponsorships which may be featured at the start, middle, and/or the end of the episode. These sponsorships are for informational purposes only and are not a solicitation to use any product or service.     

Talking Digital Industries
Industrial 5G – is there really something behind it?

Talking Digital Industries

Play Episode Listen Later Jun 22, 2020 22:16


In the fifth episode of “Talking Digital Industries” moderator Chris Brow dives into the topic of Industrial 5G and learns why it is an essential topic for the industry. Together with his guests Sander Rotmensen, Head of Product Management Industrial Wireless & Security Components at Siemens Digital Industries and Andreas Kornbichler, Head of research group “Wireless Networks” at Siemens Corporate Technology he discusses why 5G brings more than faster download speeds, how robots can become cobots and why 5G isn´t always 5G. Join our podcasters and have a look into the “Zauberkugel” (crystal ball) to learn about 5G and to explore what will happen beyond 5G. See acast.com/privacy for privacy and opt-out information.

head 5g industrial wireless networks zauberkugel chris brow
Talking Digital Industries
Industrial 5G – is there really something behind it?

Talking Digital Industries

Play Episode Listen Later Jun 22, 2020 22:17


In the fifth episode of “Talking Digital Industries” moderator Chris Brow dives into the topic of Industrial 5G and learns why it is an essential topic for the industry. Together with his guests Sander Rotmensen, Head of Product Management Industrial Wireless & Security Components at Siemens Digital Industries and Andreas Kornbichler, Head of research group “Wireless Networks” at Siemens Corporate Technology he discusses why 5G brings more than faster download speeds, how robots can become cobots and why 5G isn´t always 5G. Join our podcasters and have a look into the “Zauberkugel” (crystal ball) to learn about 5G and to explore what will happen beyond 5G. See acast.com/privacy for privacy and opt-out information.

head 5g industrial wireless networks zauberkugel chris brow
Cisco Champion Radio
S7|E23 Resiliency on Wireless Networks

Cisco Champion Radio

Play Episode Listen Later Jun 17, 2020 42:18


In this episode of Cisco Champions Radio, our Cisco Champions talk to Cisco’s Wireless Product Manager, Ankur Bhasin, about Wireless Resiliency, as in no longer waiting for scheduled down-time to deploy new Access Points or software updates. The discussion also covers the new Cisco DNA Center feature, User Defined Network (UDN), for use cases like dormitories or long-term hospital stays; as well as other Wireless resiliency topics. https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html?dtid=opdcsnc001469 Cisco Champion hosts Dan Kelcher, NTT Data Services, Enterprise Architecture Advisor Samuel Clements (https://twitter.com/samuel_clements), Presidio, Engineering Director, Office of the CTO, Mobility Guest Ankur Bhasin, Cisco, Wireless Product Line Manager Moderator Lauren Friedman (https://twitter.com/lauren), Technical Influencer Marketing and Cisco Champions Program

Cisco Champion Radio
S7|E23 Resiliency on Wireless Networks

Cisco Champion Radio

Play Episode Listen Later Jun 17, 2020 42:18


In this episode of Cisco Champions Radio, our Cisco Champions talk to Cisco’s Wireless Product Manager, Ankur Bhasin, about Wireless Resiliency, as in no longer waiting for scheduled down-time to deploy new Access Points or software updates. The discussion also covers the new Cisco DNA Center feature, User Defined Network (UDN), for use cases like dormitories or long-term hospital stays; as well as other Wireless resiliency topics. https://www.cisco.com/c/en/us/products/wireless/wireless-lan-controller/index.html?dtid=opdcsnc001469 Cisco Champion hosts Dan Kelcher, NTT Data Services, Enterprise Architecture Advisor Samuel Clements (https://twitter.com/samuel_clements), Presidio, Engineering Director, Office of the CTO, Mobility Guest Ankur Bhasin, Cisco, Wireless Product Line Manager Moderator Lauren Friedman (https://twitter.com/lauren), Technical Influencer Marketing and Cisco Champions Program

The Behind the Connection Podcast
Wireless Networks and Preparing for 5G

The Behind the Connection Podcast

Play Episode Listen Later Apr 23, 2020 52:15


You may not think much about what happens when you pull out your smartphone to make a call or browse the web, but a lot of work goes into making that connection possible. From building cell towers to bidding on spectrum, the challenges are varied and complicated. On this episode we have Allen Bennion and Jeff Cranney from STRATA Networks to shed some light on the many factors involved with building wireless networks, and what 5G really means for you.

preparing 5g wireless networks
Pharmacy, IT, & Me: Your Informatics Pharmacist Podcast
187. Different Types of Wireless Networks

Pharmacy, IT, & Me: Your Informatics Pharmacist Podcast

Play Episode Listen Later Apr 13, 2020 10:26


187. Different Types of Wireless Networks Intended Audience: Newcomers to Pharmacy InformaticsToday, we go over some of the different types of wireless network technologies that are in use today. Wireless technologies are important in many healthcare technologies, including workflow technologies, telehealth, digital health, and more. Follow us on social media! Twitter: @pharmacyitme Instagram: @pharmacyinformatics LinkedIn: https://www.linkedin.com/company/pharmacyitme/ Website: Pharmacy IT & Me Email: tony@pharmacyitme.com Follow Tony's personal Twitter account at @tonydaopharmd Network with other pharmacists at Pharmacists Connect!http://pharmacistsconnect.com For more information on pharmacy informatics, check out some of the following useful links: ASHP's Section of Pharmacy Informatics and Technology: https://www.ashp.org/Pharmacy-Informaticist/Section-of-Pharmacy-Informatics-and-Technology/ HIMSS Pharmacy Informatics Community: https://www.himss.org/library/pharmacy-informatics Disclaimer: Views expressed are my own and do not reflect thoughts and opinions of any entity with which I have been, am now, or will be affiliated.This podcast is powered by Pinecast.

technology wireless different types pinecast wireless networks pharmacy informatics
RIoT Underground
XXV: From 10th Century King Bluetooth to Today's IoT Network Protocols, with Nordic Semiconductor's Clay Hine and Scott Bland

RIoT Underground

Play Episode Listen Later Dec 5, 2019 32:07


Do you know the connection between a 10th-century Nordic king and Bluetooth technology? Interested in the latest dialogue about IoT wireless protocols? Join us in RIoT Studios with two guests from Nordic Semiconductor, Clay Hine and Scott Bland. Clay and the Nordic team have been fabulous RIoT supporters, offering workshops, exhibit tables, and more at RIoT events. Join us for this episode to hear Clay in person, and you'll understand why his group is such a valuable part of the IoT ecosystem. Nordic Semiconductor is a fabless semiconductor company specializing in ultra-low power performance wireless system on a chip (SoC) and connectivity devices for the 2.4 GHz ISM band, with power consumption and cost being the main focus areas. Typical end-user applications are consumer electronics, wireless mobile phone accessories, wireless gamepad, mouse, and keyboard, intelligent sports equipment, wireless medical, remote control, wireless voice-audio applications, security, and toys.Support the show (http://www.ncriot.org)

Women in Tech Podcast, hosted by Espree Devora
Melody Walker of Boingo Wireless, Helping The World Stay Connected: Women In Tech Los Angeles

Women in Tech Podcast, hosted by Espree Devora

Play Episode Listen Later Nov 25, 2019 37:51


Today we get to know Melody Walker of Boingo Wireless. Over the past 18 years Boingo has grown from start-up to the leading Wi-Fi company in the world, and the largest indoor DAS (cellular) provider in the United States. To support the Women in Tech podcast go to https://www.patreon.com/womenintech - tweet @womenintechshow and @EspreeDevora. https://twitter.com/Boingo http://twitter.com/womenintechshow https://twitter.com/espreedevora

Cybersecurity FOREVER
#21 - How do hackers attack on WIRELESS NETWORKS?

Cybersecurity FOREVER

Play Episode Listen Later Nov 12, 2019 16:12


Day 21: Today I will discuss: How hackers attack on WIRELESS NETWORKS? 1. How have wireless technologies changed our lives? 2. Different types of possible attacks on wireless network? 3. Demonstration of the WIRELESS ATTACK. Please leave the comments and share with your friends. You can connect with me: Facebook Page : Cybersecurity Prism (https://www.facebook.com/LuminisConsultingServices) Facebook Group : Cybersecurity Forever (https://www.facebook.com/groups/642084319272190/) Linkedin Page : Cybersecurity Prism (https://www.linkedin.com/company/10117131/) Hear My Podcast: https://anchor.fm/meena-r #Cybersecurity #linux #EthicalHacking #Hacking #Hacker #cybersecurityawareness #cybersecuritythreats #cybersecuritytraining #informationsecurity #itsecurity #Cyber #Security #KaliLinux #networking, #hacked #technology #IT #infosec #computers #privacy #datasecurity #malware #ransomeware #cyberattack #iot #itsecurity #cyberthreats #cyberattack #pentesting #cloudsecurity #computersecurity #jobs --- Send in a voice message: https://anchor.fm/meena-r/message

Medicine on Call with Dr. Elaina George
The Health Implications of 5G Wireless Networks

Medicine on Call with Dr. Elaina George

Play Episode Listen Later Nov 9, 2019


Are wireless companies overlooking the dangers of new technology to keep up with market demand? Theodora Scarato joins Dr. George to discuss the dangers of 5G wireless technology.

health 5g implications wireless networks 5g wireless
Well / Connected with Dr. Joe Kvedar
Well Connected, EP 304, Dina Katabi

Well / Connected with Dr. Joe Kvedar

Play Episode Listen Later Sep 17, 2019 26:17


For episode 304, Dr. Kvedar talks with Dina Katabi, MIT Professor and Director of the Center for Wireless Networks and Mobile Computing.  They have an interesting discussion about the system she designed to passively collect data without the need for devices, why it represents a major advancement in data collection and how all of this... Read more »

director mit professor well connected wireless networks mobile computing kvedar katabi
The CyberWire
Venezuela blames power failure on exotic sabotage, again. Huawei may have built North Korea’s 3G wireless networks. Were record privacy fines high enough? Logic bombing the customer.

The CyberWire

Play Episode Listen Later Jul 23, 2019 19:27


Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html  Support our show

@BEERISAC: CPS/ICS Security Podcast Playlist
Configuring Wireless Networks for Mobile Use

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jun 27, 2019 27:37


Podcast: Automation World Gets Your Questions AnsweredEpisode: Configuring Wireless Networks for Mobile UsePub date: 2019-06-21In this third episode of the “Automation World Gets Your Questions Answered” podcast series, we connect with Justin Shade of Phoenix Contact to explore industrial wireless technologies and their OT/IT collaboration requirements, speed capabilities, and security concerns. This podcast is sponsored by Allied Electronics and Automation.The podcast and artwork embedded on this page are from Automation World, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

mobile automation listen notes configuring wireless networks phoenix contact ot it
Radio Cade
Underwater Wireless Networks

Radio Cade

Play Episode Listen Later Jun 26, 2019 16:35


George Sklivanitis, founder of Extreme Comms Lab, believes we can build underwater wireless networks. Using enhanced modems on existing nodes (such as ships and submarines), his team’s technology can boost signal strength under the sea by 10 times. A native of Athens, Greece, George studied on the island of Crete before moving to Buffalo NY, and finally Florida Atlantic University. His advice to prospective inventors: “Use criticism as a fuel to keep going. Don’t give up.”

Automation World Gets Your Questions Answered
Configuring Wireless Networks for Mobile Use

Automation World Gets Your Questions Answered

Play Episode Play 60 sec Highlight Listen Later Jun 21, 2019 27:37


In this third episode of the “Automation World Gets Your Questions Answered” podcast series, we connect with Justin Shade of Phoenix Contact to explore industrial wireless technologies and their OT/IT collaboration requirements, speed capabilities, and security concerns. This podcast is sponsored by Allied Electronics and Automation.

The Smart Community Podcast
Starting with Smart Foundations, with Adam Davis

The Smart Community Podcast

Play Episode Listen Later Feb 10, 2019 24:57


In this episode of the Smart Community Podcast, I spoke with Adam Davis, the Director of TPL Connect, and a consultant in the design and delivery of Wired and Wireless Networks in Smart Cities, Data Centres, IoT, Telecommunications and Enterprise sectors. Adam shares with us his background as a cabling technician and project manager, and how working with local councils in ICT design and strategy really sparked his interest in the Smart City space. Adam tells us how he sees Australia currently embracing the Smart City or Smart Region concept, and some of the mistakes he's seen Councils make when adopting new technology. We discuss the importance of having an overarching vision or roadmap when undertaking any kind of Smart City planning, and what some of the key components of such a framework are. Adam shares some of the projects he's currently working on, primarily focusing on the foundation layer such as fibre infrastructure to support wireless and sensor networks, and the amount of that foundation layer technology that is needed before the 5G network can be usable. Adam says that boring foundation layer of infrastructure is something that's often overlooked in the Smart arena, and how it's an emerging trend/problem we should all be talking about more. We also cover the need for interoperability of new tech so that legacy systems don't hinder progress, why councils need multidisciplinary teams in order for integration to be successful, and finish our chat discussing the emerging trend of skillset gaps in both city and regional teams, such as lack of data analysts, integration and systems thinking. As always I hope you enjoy listening to this episode as much as I enjoyed making it.Find the full show notes as: www.mysmart.communityConnect with Adam via LinkedIn or email adam.davis@tplconnect.com.auConnect with me via email: hello@mysmart.communityConnect via LinkedIn, Twitter and Facebook @smartcommpod

People in Places
EP 2: Why Wireless Networks are Key to Your Customer Intelligence Strategy w/ Özer Dondurmacıoğlu

People in Places

Play Episode Listen Later Dec 11, 2018 25:48


The world of wireless networks has evolved from a commodity to a core part of data strategy, and early concerns about speed and security are being replaced with a desire to know what to do with all the data coming in. Özer Dondurmacıoğlu, VP of Location Services at HPE Aruba, joined the podcast to talk about why wireless networks are now key to your customer intelligence strategy.

strategy location services wireless networks customer intelligence hpe aruba
VisionKeepers™
Vinod Namboodiri - Wichita EDU

VisionKeepers™

Play Episode Listen Later Aug 26, 2018 29:05


Dr. Vinod Namboodiri graduated with a Ph.D. in Electrical and Computer Engineering from the University of Massachusetts, Amherst. His research interests have been in the design, analysis and evaluation of systems that solve challenges in Mobile Computing, Wireless Networks, and Smart Electric Power Grids. Dr. Namboodiris current research interests are in the design and application of technology to make communities more accessible for those with disabilities.

The Cisco Learning Network
Introduction to Types of Wireless Networks

The Cisco Learning Network

Play Episode Listen Later Jul 9, 2018 13:10


In this episode of the Cisco Learning Network Podcast, you will get an introduction to the types of wireless networks and topologies that exist today. We hear from Bob Liggett, an wireless networking engineer and content developer for Cisco. The episodes contains audio portions of a CCNA Wireless webinar series hosted by the Cisco Learning Network. To view the full webinar this segment is from, and more CCNA Wireless Training videos to help you get started in your networking career, please go to: http://cs.co/9001DoMsv

types cisco wireless networks
PharmaTalkRadio
Wireless Remote Monitoring – DPharm Podcast Series #2

PharmaTalkRadio

Play Episode Listen Later Feb 17, 2018 30:00


DPharm podcast series # 2  MIT Professor, Dina Katabi, PhD gave one of the best talks on in home non-intrusive patient monitoring at DPharm 2017 and provided a demo of technology that uses ambient radio signals to monitor a patient’s gait, falls, breathing, heart rate and even sleep, all without putting any sensor on the patient’s body. Find out how they have used the technology to redefine clinical endpoints and pushed clinical trials to the home. The next DPharm conference is September 25-26 in Boston. DPharm reports on innovation and disruptive innovation to advance clinical trials and supports the community behind the movement.  Speaker: Dina Katabi, PhD MacArthur Fellow, Andrew & Erna Viterbi Professor, MIT, and Director of MIT Center for Wireless Networks and Mobile Computing Producer: Valerie Bowling, Executive Director, DPharm

Legal Studies at the School of Advanced Study
Intermediary Liability and Community Wireless Networks Design Shaping: the Mc Fadden ECJ Case

Legal Studies at the School of Advanced Study

Play Episode Listen Later Nov 8, 2016


Institute of Advanced Legal Studies Restricted and Redacted: Where now for human rights and digital information control? Panel A - Afternoon Session Intermediary Liability and Community Wireless Networks Design Shaping: the Mc Fadden ECJ Case...

Inside Out Security
IoT Pen Tester Ken Munro: Probing Wireless Networks (Part 2)

Inside Out Security

Play Episode Listen Later Nov 1, 2016 10:11


We have more Ken Munro in this second part of our podcast. In this segment, Ken tells us how he probes wireless networks for weaknesses and some of the tools he uses. One takeaway for me is that the PSKs or passwords for WiFi networks should be quite complex, probably at least 12 characters. The hackers can crack hashes of low-entropy WiFi keys, which they can scoop up with wireless scanners. Ken also some thoughts on why consumer IoT devices will continue to be hackable. Keep in mind that his comments on security and better authentication carry over quite nicely to the enterprise world. Transcript Inside Out Security: You’ve focused mostly on testing the IoT — coffee makers, doorbells, cameas –and it’s kind of stunning that there’s so much consumer stuff connected to the internet.  The Ring Doorbell and iKettle, were examples I think, where you obtained the WiFi PSKs (pre-shared keys). Could you talk more your work with these gadgets? Ken: Yeah, so where they're interesting to us is that in the past to get hold of decent research equipment to investigate, it used to be very expensive. But now that the Internet of Things has emerged. We're starting to see low-cost consumer goods with low-cost chip sets, with low-cost hardware, and low-cost software starting to emerge at a price point that the average Joe can go and buy and put into their house. A large company, if they buy technologies, has probably got the resources to think about assessing their security … And put some basic security measures around.  But average Joe hasn't. So what we wanted to do was try and look to see how good the security of these devices was, and almost without exception, the devices we've been looking at have all had significant security flaws! The other side of it as well, actually, it kind of worries me. Why would one need a wireless tea kettle? IOS: Right. I was going to ask you that. I was afraid to. Why do you think people are buying these things? The advantage is that you can, I guess, get your coffee while you're in the car and it'll be there when you get home? Ken: No. It doesn't work like that …Yeah, that's the crazy bit. In the case of the WiFi kettle, it only works over WiFi. So you've got to be in your house!   IOS: Okay. It's even stranger. Ken: Yeah, I don't know about you but my kitchen isn't very far away from the rest of my house. I'll just walk there, thanks.   IOS: Yeah. It seems that they were just so lacking in some basic security measures … they left some really key information unencrypted. What was the assumption? That it would be just used in your house and that it would be just impossible to someone to hack into it? Ken: You're making a big step there, which is assuming that the manufacturer gave any thought to an attack from a hacker at all. I think that's one of the biggest issues right now is there are a lot of manufacturers here and they're rushing new product to market, which is great. I love the innovation. I'm a geek. I like new tech. I like seeing the boundaries being pushed. But those companies that are rushing technologies to market with not really understanding the security risk. Otherwise, you're completely exposing people's homes, people's online lives by getting it wrong.   IOS: Right. I guess I was a little surprised. You mentioned in your blog something called wigle.net? Ken: Yeah, wigle is ….  awesome and that's why WiFi's such a dangerous place to go.   IOS: Right. Ken: Well, there's other challenges. It's just the model of WiFi -- which is great, don't get me wrong -- when you go home with your cell phone, your phone connects to your WiFi network automatically, right? Now, the reason I can do that is by sending what are called client probe requests. And that's your phone going, "Hey, WiFi router, are you there? Are you there? Are you there?" Of course, when you're out and about and your WiFi's on, it doesn't see your home WiFi router. But when you get home, it goes, "Are you there?" "Yeah, I'm here," and it does the encryption and all your traffic's nice and safe. What wigle does — I think it stands for wireless integrated geographic location engine, which is crazy …  security researchers have been out with wireless sniffers, scanners, and mapped all the GPS coordinates of all the wireless devices they see. And then they collate that onto wigle.net, which is a database of these which you can basically query a wireless network name … and work out where they are. So it's really easy. You can track people using the WiFi on their phones using wigle.net. You can find WiFi devices. A great example of that was how we find the iKettle, that you can search wigle.net for kettles. It's crazy!   IOS: Yeah, I know. I was stunned. I had not seen this before. I suspect some of the manufacturers would be surprised if they saw this. We see the same thing in the enterprise space or IT. I'm just sort of surprised that's just so many tools and hacking tools out there. But in any case, I think you mentioned that some of these devices start up as an access point and that, in that case, you know the default access name of the iKettle or whatever the device is, and then you could spot it. Is this the way the hackers work? Ken: No, that's right. The issue with an IoT WiFi device is that when you first put it up, you need to get through a process of connecting to it and connecting it to your home WiFi network. And that is usually a two-stage process. Usually. It depends. Some devices don't do this but most devices, say, the iKettle, will set itself up as an access point first or a client-to-client device, and then once you go in and configure it with your cell phone, it then switches into becoming a client on your WiFi network. And it's going through that set of processes where we also found issues and that's where you can have some real fun.   IOS: Right. I think you took the firmware of one of these devices and then was able to figure out, let's say, like a default password. Ken: Yeah. That's another way. It's a completely different attack. So that's not what we'll do in the iKettle. We didn't need to go near the firmware. But a real game changer with IoT devices is that the manufacturer is putting their hardware in the hands of their customers … Let's say you're a big online retailer. Usually you bring them in with application and you buy stuff. With the Internet of Things, you're actually putting your technology -- your kit, your hardware, your firmware, your software — into the hands of your consumers. If you know what you're doing, there's great things you can do to analyze the firmware. You can extract off from devices, and going through that process, you can see lots of useful data. It's a real game changer, unlike a web application where you can protect it with a firewall … But the Internet of Things, you put your chips into the hands of your customers and they can do stuff with that potentially, if they have got security right.   IOS: Right. Did you talk about they should have encrypted the firmware or protected it in some way? Is that right? Ken: Yeah. Again, that's good practice. In security, we talk about having layers of defense, what we call defense in depth so that if any one layer of the security chain is broken, it doesn't compromise the whole device. And a great example for getting that right would be to make sure you protect the firmware. So you can digitally sign the code so that only valid code can be loaded onto your device. That's a very common problem in design where manufacturers haven't looked at code signing and therefore we can upload rogue code. A good example of that was the Ring doorbell. Something that's attached to the outside of your house. You can unscrew it. You can walk off with it. And we found one bug whereby you can easily extract the WiFi key from the doorbell! Again, the manufacturer fixed that really quickly, which is great, exactly what we want to see, but our next step is looking at it and seeing if we can take the doorbell, upload a rogue code to it, and then put it back on your door. So we've actually got a back door on your network.   IOS: Right, I know. Very scary. Looking through your blog posts and there were a lot of consumer devices, but then there was one that was in a, I think, more of a borderline area and it was ironically a camera. It could potentially be a security camera. Was that the one where you got the firmware? Ken: Yeah, that was an interesting one. We've been looking at some consumer grade CCTV cameras, although we see these in businesses as well. And we've particularly been looking at the cameras themselves and also the digital video recorders, the DVRs where they record their content onto. So many times we find someone has accidentally put a CCTV camera on the public Internet. You've got a spy cam into somebody's organization! The DVR that records all the content, sometimes they put those on the Internet by mistake as well. Or you find the manufacturers built it so badly that ..  it goes on by itself, which is just crazy.   IOS: Yeah, there's some stunning implications, just having an outsider look into your security camera. But you showed you were able to, from looking at the...it was either the firmware or once you got into the device, you could then get into network. Was that right? Ken: Yeah, that's quite ironic really, isn't it? CCTV cams, you consider to be a security device. And what we found is not just the camera but also the DVR, if you put it on your network and ,,, it can create a backdoor onto your network as well. So you put on a security device that makes you less secure.   IOS: One of things you do in your assessments is wireless scanning and you use something, if I'm not mistaken, called Kismet? Ken: Kismet's a bit old now ... There are lots of tools around but the Aircrack suites is probably where it's at right now And that's a really good suite for wireless scanning and wireless g cracking.   IOS: Right. So I was wondering if you could just describe how you do a risk assessment. What would be the procedure using that particular tool? Ken: Sure. At its most basic, what you'd be looking to do, let's say you're looking at your home WiFi network. Basically, we need to make sure your WiFi is nice and safe. And security of a WiFi key  is how long and complex it is. It's very easy to grab an encrypted hash of your WiFi key by sitting outside with a WiFi antenna and a tool like Aircrack, which allows you to grab the key. What we then want to do is try and crack that offline. So once I've got your WiFi key, I'm on your network, and we find in a lot of cases that ISP WiFi routers, the default passwords just aren't complicated enough. And we looked at some of the ISPs in the U.K. and discovered that some of the preset keys, we could crack them on relatively straight-forward equipment in as little as a couple of days.   IOS: Okay. That is kind of mind-blowing because I was under the impression that those keys were encrypted in a way that would make it really difficult to crack. Ken: Yeah, you hope so but, again, it comes down to the length and complexity of the key. If you WiFi network key is  only say -- I don't know — eight characters long and it's not really going to stand up to a concerted attack for very long. So again, length and complexity is really important.   IOS: Yeah, actually we do see the same thing in the enterprise world and one of the first recommendations security pros make is the keys have to be longer and the passwords have to be longer than at least 8. Ken: We've been looking at some ... there's also the character set as well. We often find … the WiFi router often might only have lower case characters and maybe some numbers, and those numbers and characters are always in the same place in the key. And if you know where they are and you know they're always going to be lower case, you've reduced the complexity.   IOS: Right. Ken: So I'd really like to be seeing 12-, 15-, 20-character passwords. It's not a difficult thing. Every time you get a new smartphone or a new tablet, you have to go and get it from the router then but really I think people can cope with longer passwords that they don't use very often, don't you think?   IOS: No, I absolutely agree. We sort of recommend, and we've written about this, that you can...as an easy way to remember longer passwords, you can make up a mnemonic where each letter becomes part of a story. I don't know if you've heard of that technique. You can get a 10-character password that's easy to remember and therefore becomes a lot harder to decrypt. We've also written a little bit about some of the decrypting tool that are just easily available, and I think you mentioned one of them. Was it John the Ripper?   Ken: John is a password brute force tool and that's really useful. That's great for certain types of passwords. There are other tools for doing different types of password hashes but John is great. Yeah, it's been around for years. IOS: It's still free. Ken: But there are lots of other different types of tools that crack different types of password.   IOS: Okay. Do you get the sense that, just going back to some of these vendors who are making these devices, I think you said that they just probably are not even thinking about it and perhaps just not even aware of what's out there? Ken: Yeah, let's think about it. The majority of start-up entrepreneur organizations that are trying to bring a new IoT device to market, they've probably got some funding. And if they're building something, it's probably going to be going into production nine months ahead. Imagine you've got some funding from some investors, and just as you're about to start shipping, somebody finds a security bug in your product! What do you do? Do you stop shipping and your company goes bust? Or do you carry on and trying to deal with the fallout? I do sympathize with these organization, particularly if they had no one giving them any advice along the way to say, "Look, have you thought about security?" Because then they're backed into a corner. They've got no choice but to ship or their business goes bankrupt, and they've got no ability to fix the problem. And that’s probably what happened with the guys who made the WiFi kettle. Some clever guys had a good idea, got themselves into a position where they were committed, and then someone finds a bug and there's no way of backing out of shipping.   IOS: Right, yeah. Absolutely all true.  Although we like to preach something called Privacy by Design — at least it’s getting a lot more press than it did a couple years ago — which is just the people at the C-level suite should just be aware that you have to start building some of these privacy and security ideas into the software. Although it's high-sounding language. And you're right, when it comes to it, a lot of companies, especially start-ups, are really going to be forced to push these products out and then send out an update later, I guess is the idea. Or not. I don't know.   Ken: That's the chance, isn't it? So if you look at someone like Tesla, they've had some security bugs found last year and they have the ability to do over-the-Internet updates. So the cars can connect over WiFi and all their security bugs were fixed over the air in a two-week period! I thought that was fantastic. So they can update in the field ... if you figured out that, brilliant. But they don't have the ability to do updates once they're in the field. So then you end up in a real stick because you've got products you can only fix by recalling, which is a huge cost and terrible PR. So hats off to Tesla for doing it right. And the same goes for the Ring doorbell. The guys thought about it. They had a process whereby it got the updates really, really easy, it's easy to fix, and they updated the bug that we found within about two weeks. And that's the way it should be. They completely thought about security. They knew they couldn't be perfect from the beginning. "Let's put a cable in place, a mechanism, so we can fix anything that gets found in the field."   IOS: Yes. We're sort of on the same page. Varonis just sees the world where there will always be a way for someone to get into especially newer products and you have to have secondary defenses. And you've talked about some good remediations with longer passwords, and another one we like is two-factor authentication. Any thoughts on biometric authentication? Ken: Yes. Given the majority of IoT devices have being controlled by a smartphone, I think it's really key for organizations to think about how they've authenticated the customer to a smart device or, if they have a web app, the web interface as well, how they authenticate the customer to that. I'm a big fan of two-factor authentication. People get their passwords stolen in breaches all the time. And because they will reuse their passwords across multiple different systems, passwords stolen from one place and you find another place gets compromised. There was a great example, I think, some of the big data breaches ... they got a password stolen in one breach and then someone got their account hacked. It wasn't hacked. They just had reused the password!   IOS: Right. Ken: So I'm a real fan of two-factor authentication to prevent that happening. Whether it's a one-time SMS to your phone or a different way of doing it, I think two-factor authentication is fantastic for helping Average Joe deal with security more easily. No one's going to have an issue with, "Look, you've sent me an SMS to my phone". That's another layer of authentication. Great. Fantastic." I'm not so much a fan of biometrics by themselves and the reason for that is my concern about revocation. Just in case the biometric data is actually breached, companies get breached all the time, we've not just lost passwords because passwords we throw them away, we get new ones, but if we lose your biometic, we're in a bit more of a difficult position. But I do biometrics work brilliantly when they're combined with things like passwords. Biometric plus password is fantastic as a secure authentication.   IOS: Thanks for listening to the podcast. If you're interested in following Ken on Twitter, his handle is TheKenMunroShow or you can follow his blog at PenTestPartners.com. Thanks again.

Mac Geek Gab (Enhanced AAC)
MGG 574: For Wireless Networks, Time Is a Hero

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Oct 12, 2015


Changing Finder view defaults, managing iOS 9 email accounts, RAID in El Capitan and much more are covered by your two favorite geeks today. Subscribe or simply press Play to enjoy! Sponsor: Carbon Copy Cloner has been helping you create bootable backups of your Mac since 2002. Now with SafetyNet, […]

Modern Collaboration
Supporting Unified Communications and Voice with Wireless Networks

Modern Collaboration

Play Episode Listen Later Aug 6, 2015 21:11


In this episode we're talking wireless and mobility and what that means to the Wifi backbone we all take for granted as we wander all over our offices or workplace campuses on whatever devices we have handy.   I’m pleased to be joined by Christian Gilby, the Director of Product Marketing at Aruba Networks. Aruba has been a market leader on the cutting edge of wireless networking for years and this May they were acquired by HP. Take a listen to learn how companies need to adapt their wireless backbone to support enhance communications and collaboration going over Wifi.

Excelsior Life
Today in Cybersecurity: Are Public Wireless Networks Safe?

Excelsior Life

Play Episode Listen Later Oct 22, 2014 9:01


In this podcast, Derek Smith highlights security threats you may encounter when using public wireless access points, and explains what you need to know to use wireless safely in public. Derek A. Smith Biography Derek A. Smith is the Director of Cyber Security Initiatives at the National Cyber Security Institute at Excelsior College. Mr. Smith has years of government and military leadership experience and holds an MBA, Master of Science in Information Assurance, Master in Information Technology Project Management, and B.S in Education. He also holds the following certifications:  Certified Information Systems Security Professional (CISSP), Certified Authorization Professional (CAP), Certified Ethical Hacker (CEH), Certified Hacking Forensic Investigator, Computer Network Defense Architect, Certified EC-Council Instructor, Certified SCADA Security Architect (CSSA), and Security+.    

Intel Chip Chat
Revolutionizing Wireless Networks – Intel® Chip Chat episode 236

Intel Chip Chat

Play Episode Listen Later Mar 10, 2013 14:07


Live from Mobile World Congress: Sandra Rivera, director of market development for Intel, comes to the show with insights on transforming mobile networks – taking the data center technologies that Intel provides a foundation in (cloud computing, virtualization, power management, etc.) and bringing them to mobile networks. Operators can take fixed function, proprietary networks and apply controls for things like power management (shutting down a network when not in use). For more information, visit www.intel.com/mwc.

Hamilton Institute Seminars (iPod / small)
Effective Information Delivery Through Opportunistic Replication in Wireless Networks

Hamilton Institute Seminars (iPod / small)

Play Episode Listen Later Nov 27, 2012 78:07


Speaker: Prof. L. Tassiulas Abstract: Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In all cases the available other node information might be used to effectively increase the efficiency of the information delivery process. We will consider first an information theoretic perspective and present a scheme that exploits the opportunistically available overheard information to achieve the Shannon capacity of the broadcast erasure channel. Then we will consider information transport in a multi-hop flat wireless network and present schemes for spatial information replication based on popularity, in association with any-casting routing schemes, that achieve asymptotically optimal performance.

Hamilton Institute Seminars (HD / large)
Effective Information Delivery Through Opportunistic Replication in Wireless Networks

Hamilton Institute Seminars (HD / large)

Play Episode Listen Later Nov 27, 2012 78:07


Speaker: Prof. L. Tassiulas Abstract: Increased replication of information is observed in modern wireless networks either in pre-planned content replication schemes or through opportunistic caching in intermediate relay nodes as the information flows to the final destination or through overhearing of broadcast information in the wireless channel. In all cases the available other node information might be used to effectively increase the efficiency of the information delivery process. We will consider first an information theoretic perspective and present a scheme that exploits the opportunistically available overheard information to achieve the Shannon capacity of the broadcast erasure channel. Then we will consider information transport in a multi-hop flat wireless network and present schemes for spatial information replication based on popularity, in association with any-casting routing schemes, that achieve asymptotically optimal performance.

Hamilton Institute Seminars (iPod / small)
In Search of Optimality: Network Coding for Wireless Networks

Hamilton Institute Seminars (iPod / small)

Play Episode Listen Later Aug 28, 2012 59:52


Speaker: Dr. M. A. Chaudry Abstract: Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networks; specifically we investigate the Index Coding problem. In wireless networks, each transmitted packet is broadcasted within a certain region and can be overheard by the nearby users. When a user needs to transmit packets, it employs the Index Coding that uses the knowledge of what the user's neighbors have heard previously (side information) in order to reduce the number of transmissions. The objective is to satisfy the demands of all the users with the minimum number of transmissions. With the Index Coding, each transmitted packet can be a combination of the original packets. The Index Coding problem has been proven to be NP-hard, and NP-hard to approximate. Noting that the Index Coding problem is not only NP-hard but NP-hard to approximate, we look at it from a novel perspective and define the Complementary Index Coding problem; where the objective is to maximize the number of transmissions that are saved by employing the Index Coding compared to the solution that does not involve coding. We prove that the Complementary Index Coding problem can be approximated in several cases of practical importance. We investigate both the multiple unicast and multiple multicast scenarios for the Complementary Index Coding problem for computational complexity, and provide polynomial time approximation algorithms.

Hamilton Institute Seminars (HD / large)
In Search of Optimality: Network Coding for Wireless Networks

Hamilton Institute Seminars (HD / large)

Play Episode Listen Later Aug 28, 2012 59:52


Speaker: Dr. M. A. Chaudry Abstract: Network coding has gained significant interest from the research community since the first paper by Alshwede et al., in 2000. Network coding techniques can significantly increase the overall throughput of wireless networks by taking advantage of their broadcast nature. We focus on network coding for wireless networks; specifically we investigate the Index Coding problem. In wireless networks, each transmitted packet is broadcasted within a certain region and can be overheard by the nearby users. When a user needs to transmit packets, it employs the Index Coding that uses the knowledge of what the user's neighbors have heard previously (side information) in order to reduce the number of transmissions. The objective is to satisfy the demands of all the users with the minimum number of transmissions. With the Index Coding, each transmitted packet can be a combination of the original packets. The Index Coding problem has been proven to be NP-hard, and NP-hard to approximate. Noting that the Index Coding problem is not only NP-hard but NP-hard to approximate, we look at it from a novel perspective and define the Complementary Index Coding problem; where the objective is to maximize the number of transmissions that are saved by employing the Index Coding compared to the solution that does not involve coding. We prove that the Complementary Index Coding problem can be approximated in several cases of practical importance. We investigate both the multiple unicast and multiple multicast scenarios for the Complementary Index Coding problem for computational complexity, and provide polynomial time approximation algorithms.

JOEL 2 GENERATION PODCAST
wireless networks

JOEL 2 GENERATION PODCAST

Play Episode Listen Later Apr 28, 2012 33:18


a wireless network is a great analogy for the way the Gifts of the Spirit work. we can access the resources of heaven at any time, using the same password and needing no "external device". listen to learn more about how to access and utilize the network of God's Kingdom whenever you want and wherever you are.

Computing Now's News Podcast
Antennas Use Plasma to Make Wireless Networks Faster

Computing Now's News Podcast

Play Episode Listen Later Sep 28, 2011 4:08


A new type of antenna uses plasma to focus radio waves and enable ultrafast wireless networks.

plasma antennas wireless networks wigig
Hamilton Institute Seminars (iPod / small)
On Fair Coexistence of Wireless Networks via CSMA Based Transmission Algorithms

Hamilton Institute Seminars (iPod / small)

Play Episode Listen Later Jun 24, 2009 66:36


Speaker: Prof. M. Alanyali Abstract: This talk will touch on wireless coexistence issues that arise due to higher spatial density of spectrum usage. We consider a fairness perspective for autonomous scheduling of transmissions by distinct sessions, subject to constraints that are represented by a conflict graph. The emphasis is on randomized backoff-based CSMA algorithms. The resulting transmission dynamics is represented by a Markovian model whose analysis suggests practical challenges in fair sharing of spectrum by distinct sessions that subscribe to a common standard, as well as by those that do not possess a common signaling protocol.

Hamilton Institute Seminars (HD / large)
On Fair Coexistence of Wireless Networks via CSMA Based Transmission Algorithms

Hamilton Institute Seminars (HD / large)

Play Episode Listen Later Jun 24, 2009 66:36


Speaker: Prof. M. Alanyali Abstract: This talk will touch on wireless coexistence issues that arise due to higher spatial density of spectrum usage. We consider a fairness perspective for autonomous scheduling of transmissions by distinct sessions, subject to constraints that are represented by a conflict graph. The emphasis is on randomized backoff-based CSMA algorithms. The resulting transmission dynamics is represented by a Markovian model whose analysis suggests practical challenges in fair sharing of spectrum by distinct sessions that subscribe to a common standard, as well as by those that do not possess a common signaling protocol.

Publications on self-organizing networked systems
An Adaptive Multi-Purpose Transmission Scheme for H.264 Encoded Video in Wireless Networks

Publications on self-organizing networked systems

Play Episode Listen Later Jul 20, 2008


Quaritsch M., Wiesinger M., Strobl B., Rinner B.

Mac Geek Gab (Enhanced AAC)
Mac Geek Gab #143: Co-mingling Wireless Networks, Upgrading Software and Hardware, and More

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Feb 25, 2008


Dave and John first offer some clarification on co-mingling wireless types on one network, then launch into some tips on upgrading both software and hardware. Then it's the listeners' turn, and we hear a few tips from all of you. Download, subscribe, press play, and enjoy! Show notes for Mac […]

Mac Geek Gab (Enhanced AAC)
Mac Geek Gab #142: Geek Advice, Hybrid Wireless Networks, & Syncing Macs

Mac Geek Gab (Enhanced AAC)

Play Episode Listen Later Feb 17, 2008


First John and Dave start off with some general advice to help keep your geek status in good standing. Then it's off to creating and managing your Mac on more than one wireless network, including A, B, G, and N! Syncing your data makes a return to the discussion pool, […]

Adventures in Security
Episode 47 - Ad Hoc Wireless Networks

Adventures in Security

Play Episode Listen Later Mar 25, 2007 18:10


Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.

Adventures in Security
Episode 47 - Ad Hoc Wireless Networks

Adventures in Security

Play Episode Listen Later Mar 25, 2007 18:10


Losing the war with malware, Xbox support team is a hole in the dyke, College campuses are wide open, External pen tests, Software assurance, and Protecting your laptop from ad hoc wireless networks.