A recent study by the UK-based price comparison site Uswitch has found that Chile boasts the fastest average broadband internet connection across the 37 member countries of the Organisation for Economic Cooperation and Development (OECD), followed by Denmark and the United States.At 189.36Mbps, the average Chilean broadband connection can download a 1,500MB movie in just over a minute – that’s about 100Mbps faster than the average connection across the OECD, and seven times faster than the slowest country, which was Turkey, clocking in at 26.34Mbps.The second- and third-slowest average broadband connections belonged to Greece and Mexico, at 33.41Mbps and 38.77Mbps, respectively. Denmark’s 163.60Mbps and the United States’ 143.76Mbps were good for second and third places at the top end, as mentioned.To read this article in full, please click here
AMD is adding four new processor SKUs to its EPYC (formerly codenamed Milan-X) lineup of high-end chips, building additional L3 cache capability onto the existing EPYC series.The key new feature of the new 7773X, 7573X, 7473X, and 7373X chips, which were initially announced in a roadmap made public late last year, is in their physical construction — AMD refers to the new technique as 3D V-Cache. Where most processors are constructed with a single piece of silicon inside, the new AMD chips mount a second microprocessor die atop the first one, which allows for a larger L3 cache.IDC's research vice president for computing semiconductors, Shane Rau, said that this is an important feature for the very high-end applications that AMD is targeting with the EPYC series, which AMD groups under the rubric of "technical computing" — highly demanding enterprise workloads like modeling and visualization, as well as academic and scientific applications.To read this article in full, please click here
AMD is adding four new processor SKUs to its EPYC (formerly codenamed Milan-X) lineup of high-end chips, building additional L3 cache capability onto the existing EPYC series.The key new feature of the new 7773X, 7573X, 7473X, and 7373X chips, which were initially announced in a roadmap made public late last year, is in their physical construction — AMD refers to the new technique as 3D V-Cache. Where most processors are constructed with a single piece of silicon inside, the new AMD chips mount a second microprocessor die atop the first one, which allows for a larger L3 cache.IDC's research vice president for computing semiconductors, Shane Rau, said that this is an important feature for the very high-end applications that AMD is targeting with the EPYC series, which AMD groups under the rubric of "technical computing" — highly demanding enterprise workloads like modeling and visualization, as well as academic and scientific applications.To read this article in full, please click here
For the first time, 5G-capable smartphones outsold 4G/LTE devices in global monthly sales in January 2022, as demand for 5G upgrades reached its highest point yet, according to a report issued by Counterpoint Research.The upward trend of 5G smartphone sales has been accelerating for some time, and Counterpoint's report said that Western Europe and North America's proportion of 5G sales has reached 76% and 73%, respectively.According to Gartner director analyst Bill Menezes, recent gains in 5G smartphone sales have been fueled in large part by device upgrade cycles."You're starting to get 5G phones sold by default, as people upgrade on a two- or three-year cycle," he said. "From what I've seen on some of the carrier sites, there's some midrange or cheaply priced 5G phones out there, so even users who don't want to pay $1,000 for a 5G phone can get one."To read this article in full, please click here
The pace of private 5G/LTE growth in the enterprise is likely to drop substantially below earlier estimates, thanks to Covid's aftereffects and slack growth in the development of 5G-equipped endpoints, according to a report issued today by IDC.A December 2020 forecast predicted the size of the annual market for private LTE/5G wireless infrastructure to reach roughly $4.7 billion in 2023, but that figure has been revised downward to about $3.8 billion in the new report. That's still a sharp increase from 2021's $1.8 billion figure, but a substantial change, nonetheless.To read this article in full, please click here
Even as businesses continue to make the move to Wi-Fi 6, standards bodies and contributor companies are hard at work creating Wi-Fi 7, or 802.11be, the next generation of Wi-Fi technology that promises even greater capabilities than the latest in unlicensed wireless tech.A combination of new technologies focused on efficient spectrum usage and the recent FCC decision to make a huge swath of the airwaves available to Wi-Fi will push Wi-Fi 7’s peak throughput numbers as high as 40Gbit/s in certain configurations.Dorothy Stanley is the chair of the IEEE SA 802.11 working group. She said that the focus of the new standard is extremely high throughput, which is accomplished, in large part, by the wider channels enabled by the new availability of 6GHz spectrum (5.925 GHz to 7.125 GHz).To read this article in full, please click here
Cyberwarfare has been become a prominent aspect of Russia's invasion of neighboring Ukraine, but the basic infrastructure connecting both countries to the internet has remained largely unaffected, even as the Russian government may be considering imposing new limitations on access to its domestic networks.Russian network operators continue to participate in peering agreements with transit providers, meaning that the physical infrastructure connecting Russia to the internet at large is still completely intact, according to a report from network intelligence and monitoring company ThousandEyes.Yet ThousandEyes head of internet intelligence and product marketing, Angelique Medina, said that DDoS attacks and self-imposed traffic restrictions may be making the on-the-ground experience of internet use in Russia somewhat complicated.To read this article in full, please click here
The ongoing deployment of 5G networks, IoT and the automotive sector are the three biggest drivers of semiconductor revenue in the coming fiscal year, according to a new survey and analysis issued by KPMG.The accounting firm noted that semiconductor makers had shifted their organizational structures in response to those trends, with 53% of respondents reporting that they had increased their focus on specific operational requirements for hot applications — and away from general-use chipsets that can be used in multiple products.To read this article in full, please click here
The ongoing deployment of 5G networks, IoT, and demand from the automotive sector are the three biggest drivers of semiconductor revenue in the coming fiscal year, according to a new survey and analysis issued by KPMG.The accounting firm noted that semiconductor makers had shifted their organizational structures in response to those trends, with 53% of respondents reporting that they had increased their focus on specific operational requirements for hot applications—and away from general-use chipsets that can be used in multiple products.To read this article in full, please click here
The National Security Agency this week issued detailed recommendations for businesses trying to secure their networking infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks.The NSA's report began by highlighting the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).To read this article in full, please click here
The National Security Agency this week issued detailed recommendations for businesses trying to secure their networking infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks.The NSA's report began by highlighting the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).To read this article in full, please click here
The National Security Agency this week detailed recommendations for businesses to secure their network infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks.The NSA's report highlighted the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts, and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).To read this article in full, please click here
The National Security Agency this week detailed recommendations for businesses to secure their network infrastructure against attacks, giving safe configuration tips for commonly used networking protocols and urging the use of basic security measures for all networks.The NSA's report highlighted the importance of zero trust principles for network security, but the bulk of it covers specific steps network administrators should take to keep their infrastructure safe from compromise. Configuration tips for network admins include the use of secure, frequently changed passwords for all administrative accounts, limiting login attempts, and keeping potentially vulnerable systems patched and up-to-date. The report also describes safe configurations for SSH (secure shell), HTTP and SNMP (simple network management protocol).To read this article in full, please click here
The president and CEO of the Internet Corporation for Assigned Names and Numbers (ICANN) has denied a Ukrainian request that would have effectively cut the rest of the world off from Russian websites, as Russia's ongoing invasion of its neighbor entered its seventh day.In an open letter sent on March 2 to Ukrainian Deputy Prime Minister Mykhailo Fedorov, ICANN's Göran Marby said that the internet regulator has "globally agreed policies" that do not permit it to perform the requested actions, which included revocation of Russia's top-level .ru domain and SSL certificates, and the shutdown of root servers keeping large portions of the Russian internet accessible to the outside world.To read this article in full, please click here
5G connections will represent one-fifth of all worldwide mobile connections as of this year, putting those connections above the 1 billion mark for the first time, and that number will double by 2025, according to the GSMA (GSM Association).The GSMA’s Mobile Economy Report, published Wednesday, also said that 5G penetration is moving faster than either of the two previous major generations of mobile networking technology — while neither 3G nor 4G topped 2.2% of mobile connections until more than a year and a half after their introduction, 5G has already accounted for 5.5% in that time frame.There are currently almost 200 live 5G networks in 70 different countries, according to the GSMA report, which credits high demand for the rapid pace of the rollout.To read this article in full, please click here
The FCC is launching an inquiry into security issues surrounding the Border Gateway Protocol (BGP), a widely used standard used to manage interconnectivity between large portions of the Internet.The move, announced Monday, was issued in response to "Russia's escalating actions inside of Ukraine," according to the commission's notice of inquiry.BGP is, in essence, a method of ensuring that independently managed networks that make up the global internet are able to communicate with one another. Its initial design, which the FCC said is still in widespread use today, does not contain important security features, meaning that, simply by misconfiguring its own BGP information, a bad actor could potentially redirect Internet traffic wherever it sees fit. This could let that attacker send incorrect information to its targets, read and compromise login credentials, or simply shut down whichever kinds of traffic it wishes.To read this article in full, please click here
The FCC is launching an inquiry into security issues surrounding the Border Gateway Protocol (BGP), a widely used standard used to manage interconnectivity between large portions of the Internet.The move, announced Monday, was issued in response to "Russia's escalating actions inside of Ukraine," according to the commission's notice of inquiry.BGP is, in essence, a method of ensuring that independently managed networks that make up the global internet are able to communicate with one another. Its initial design, which the FCC said is still in widespread use today, does not contain important security features, meaning that, simply by misconfiguring its own BGP information, a bad actor could potentially redirect Internet traffic wherever it sees fit. This could let that attacker send incorrect information to its targets, read and compromise login credentials, or simply shut down whichever kinds of traffic it wishes.To read this article in full, please click here
FCC Chairwoman Jessica Rosenworcel announced Tuesday at Mobile World Congress in Barcelona that the US government agency will auction off spectrum in the 2.5GHz band in July for use in 5G networks, paving the way for telecom companies to further expand their midband holdings.The 2.5GHz auction represents the pending sale of what Rosenworcel called “the biggest swath of contiguous midband spectrum we have available below 3GHz,” and will be followed by a further auction of midband spectrum in the 3.1GHz-3.45GHz range.The FCC has had plans for this auction in the works for more than a year, having first sought public comment in January of 2021. The auction will cover roughly 200MHz of spectrum, and will be sold on a per-county basis, according to the earlier request for comment.To read this article in full, please click here
Microsoft announced a range of new carrier infrastructure offerings through Azure, including services for private 5G enterpise networks, at this week’s Mobile World Congress, in a move designed to bolster the company’s position as a partner to the telecom industry as 5G and edge computing deployments progess.To read this article in full, please click here
Microsoft announced a range of new carrier infrastructure offerings through Azure, including services for private 5G enterpise networks, at this week’s Mobile World Congress, in a move designed to bolster the company’s position as a partner to the telecom industry as 5G and edge computing deployments progess.To read this article in full, please click here