Tag Archives: Wireless

In 2017, Cost Per Bit Exceeds Revenues

By Carol Wilson – This is the year when most telecom network operators will see their revenue-per-bit fall below their cost-per-bit, says a veteran industry analyst, and that financial reality is going to reverberate through the industry for at least the next two years, prompting further consolidation and cuts by network gear makers, as operator capex budgets shrink.

Companies such as AT&T Inc. (NYSE: T) have been very open in saying the revenue-cost crossover drives their aggressive transformation efforts, because they recognize it is impossible to meet bandwidth requirements of the future doing things the way they’ve been done in the past.

That will mean continued price pressure on equipment vendors, CIMI Corp. CEO Tom Nolle, maintains. He points to declining revenues, quarter over quarter, for companies such as Cisco Systems Inc. (Nasdaq: CSCO), and to the fact that Huawei Technologies Co. Ltd. is alone among vendors in growing its revenues because it is a price leader in many categories.

The analyst expects 2017 and 2018, at minimum, to be pretty bleak years for the telecom equipment space. more> https://goo.gl/ayoS7W

ITU releases annual global ICT data and ICT Development Index country rankings

ITU – The Measuring the Information Society Report is widely recognized as the repository of the world’s most reliable and impartial global data and analysis on the state of global ICT development and is extensively relied upon by governments, international organizations, development banks and private sector analysts and investors worldwide.

“To bring more people online, it is important to focus on reducing overall socio-economic inequalities,” said ITU Secretary-General Houlin Zhao. “Education and income levels are strong determinants of whether or not people use the Internet.”

An increasingly ubiquitous, open, fast and content-rich Internet has changed the way many people live, communicate, and do business, delivering great benefits for people, governments, organizations and the private sector. However, many people are still not using the Internet, and many users do not fully benefit from its potential.

  • Most people have access to Internet services but many do not actually use them.
  • The full potential of the Internet remains untapped.
  • Access to the Internet is not enough; policy-makers must address broader socio-economic inequalities and help people acquire the necessary skills to take full advantage of the Internet.
  • Many people still do not own or use a mobile phone.
  • Affordability is the main barrier to mobile-phone ownership.
  • Asia and the Pacific has the lowest average purchasing power parity (PPP) $ price for mobile-cellular services of all regions.
  • Fixed-broadband prices continued to drop significantly in 2015 but remain high – and clearly unaffordable – in a number of LDCs.
  • Mobile-broadband is cheaper and more widely available than fixed-broadband, but still not deployed in the majority of LDCs (Least Developed Countries).

Mobile phone adoption has largely been monitored based on mobile-cellular subscription data since these are widely available and regularly collected and disseminated by regulators and operators.

At the end of 2016, there are almost as many mobile-cellular subscriptions as people on earth and 95% of the global population lives in an area that is covered by a mobile-cellular signal. However, since many people have multiple subscriptions or devices, other metrics need to be produced to accurately assess mobile uptake, such as the number of mobile phone users or mobile phone owners. more> https://goo.gl/L3Nh90

Related>

AT&T opens itself up to activist attack

By Rob Cox – AT&T’s $85 billion takeover of Time Warner looks like a deal from another era. Back around the turn of the millennium, corporate chieftains roamed the global capital markets freely, buying rivals at random and running roughshod over shareholders, unencumbered by vigilant boards or uppity investors.

In this profligate epoch, the Hollywood studio was a popular plaything.

In most sensible acquisitions, a buyer promises to reduce expenses in the combination, diluting the financial impact to its owners. AT&T does say it will target $1 billion in savings, but given the absence of overlap, it’s a dubious pledge.

“Most of these,” posits Cowen analyst Colby Synesael of the synergies, “will come from what will likely be meaningful headcount cuts within AT&T that were likely to occur regardless of whether AT&T was acquiring Time Warner.”

What can embittered AT&T shareholders do? They don’t get to vote on the Time Warner deal, thanks to the crafty workings of Stephenson and the board. Beyond a rival bid that rescues them or regulators squashing the plan, investors determined to put a stop to the madness could enlist the services of a modern-day white knight of sorts: an activist. more> https://goo.gl/qH2Vfl

Wireless and Precise

By Anne Fisher and Luc Darmon – Earlier attempts to accomplish precise location used methods based on measuring the RF power at a point in space and assuming a correlation between the electromagnetic field and distance to the access point.

This method requires a lot of “fingerprinting” work because you have to measure the field in many areas of the room so that you build a 3D matrix of the field [thus allowing you to] correlate with the distance. But [with the method just described] there are a number of drawbacks. First, the precision is not there. Second, as soon as you have another person or another object in the room the fingerprinting is definitely wrong, and people have to find algorithmic ways to compensate, which are fairly heavy and power consuming.

For those transitioning from methods not based on Time-of-Flight to those based on Time-of-Flight and to using impulse radio ultra wide band (IR-UWB) to measure the signal’s time of flight, there are considerations related to the technology itself.

For example, if you measure the signal’s time of flight from one object to another object, if you have an obstruction like a wall or another person, you have to assume that signal is slowed down, so the distance displayed will be larger—so you have to architect your system in a way such that you take into consideration the elements of this new technology.

Now, though, people are past the point of questions such as “what is this new technology and how does it work?” I think the market now understands there is no way to do location precisely other than with IR-UWB.

The technology in the chip is very versatile in terms of configurations and architectures. One can do a lot of different things in different systems with it. It’s a building block that people can use for doing different things and different architectures. more> https://goo.gl/9rykVv

The Smallest 64-bit Processor for the Next Billion Smartphone Users

By Caroline Hayes – Whereas the Cortex-A5 has features designed for mobile computing, and the Cortex-A7’s multi-tasking suits smartphones, this latest processor is based on the ARMv8-A architecture.

It supports both 32- and 64-bit compute capabilities but consumes 10 percent less active power than the Cortex-A7.

Nandan Nayampally, VP Marketing, CPU Group, ARM, is looking forward to continued growth in the mobile phone market. The company has already shipped two billion entry-level smartphones, equipped with Cortex-A5 and Cortex-A7.

This eight-stage pipeline features 64-bit compute capabilities and a redesigned instruction fetch operation for efficiency with fewer cache accesses for lower power consumption. The instruction fetch bandwidth is optimized to accommodate the new branch prediction techniques. Throughput is also accelerated while minimizing area and power costs, using the instruction queue, which is balanced between the fetch and execute units. more> http://goo.gl/RVEaou

The Digital Divide Is About Much More Than Access

By Rick Paulas – If you look at the numbers, it doesn’t seem like America has much of a digital divide anymore. A new survey of low- and moderate-income families shows that 94 percent of them have Internet access.

Except, the divide hasn’t actually closed. The pace and necessity of Internet-based technology has simply created other inequities. The question we need to consider is the quality of that access.

Dig deeper into the survey data, and you can see the problem with those accessibility numbers.

Of the 94 percent of families that “have” Internet access, 52 percent of them report having slow Internet, 26 percent complain about having to share a computer with too many people in their household, 20 percent say their Internet has been shut off over the past year due to lack of payment, and eight percent are still using dial-up.

Not all Internet is created equal. more> http://goo.gl/yj7hLy

Why Is Embedded Security So Difficult?


By Alan Grau [2] – There are a number of reasons that embedded security is hard. A few of the top challenges include:

  • The low cost of attack
  • The weakest link problem
  • A lack of expertise and training

It’s very easy, when talking about cybersecurity, to focus on the various technical aspects of building a secure device.

Security is only as strong as its weakest link. As security is a system issue, not just a device issue, there is a very long chain of possible attack points that must be secured. more> http://goo.gl/6U1IHZ

Related>

How to keep the Internet free and innovative

By Ryan Radia – Unless the courts or Congress rein it in, the Federal Communications Commission (FCC) might soon transform itself into the Internet Regulation Commission.

To understand the FCC’s latest power grab, think back to 1996 — the year America Online introduced its unlimited dial-up service.

That’s the last time Congress rewrote federal telecom laws, albeit making barely any mention of the Internet. One new provision, Section 706, instructed the FCC and the states to use their powers to encourage the expansion of speedy Internet access and promote infrastructure investment.

This provision sounds simple enough, but as current FCC leadership sees it, the law is an invitation for potentially boundless regulation. more> http://goo.gl/JLFxo0

How Lockheed Martin, Cisco and PWC manage cybersecurity

By Bruce Harpham – Talented information security professionals remain the linchpin of a successful cybersecurity program.

Several employment surveys have found that security skills continue to be in high demand, and some high profile security jobs can command salaries over $200,000 per year.

A major part of Lockheed’s security success comes down to the organization’s talent strategy.

“When I bring a new security analyst into Lockheed, they have the opportunity to rotate through several groups: Lockheed’s internal security unit, the group serving government clients and work with our commercial clients,” Angela Heise shared.

“We empower our security staff by giving them a say in the tools they use and help them develop their careers,” she continued.

Diversity and cross-generational cooperation is another opportunity. more> http://goo.gl/EFjyYM

5 Cybersecurity Truths to Know Now


By Peter Galvin – Below are five key points about cybersecurity today that will help you strengthen your defenses to keep your data secure.

  • Common security failures have enabled cyberattacks to cause significant damage to businesses
  • These failures include:
    ⚬ Weak security hygiene
    ⚬ Insufficient Data Protection

  • Attack vectors continue to shift
  • Private key extraction is a real threat
  • Cyber criminals’ focus is now primarily data theft …
  • High-security environments need trusted storage …

As technology evolves, so do attack methods. more> http://tinyurl.com/p3ed3zt

Related>