BrandPost: Huawei Enables Bell Canada’s Wireless to the Home (WTTH) Trials that put Canadian Rural Customers on the Path to 5G

Huawei and Bell Canada, the country’s largest communications company, today announced Bell’s successful Wireless to the Home (WTTH) trials in the 3.5 GHz and 28 GHz spectrum bands utilizing Huawei’s 5G-oriented Massive MIMO and 8T8R technology.The trials were conducted in the small Ontario communities of Orangeville, Feversham and Bethany to test and refine the capabilities of WTTH services for rural areas. As one of its next major steps in deploying high-speed home broadband in Canadian communities large and small, Bell plans deployment of WTTH to rural locations beginning in the second quarter of 2018.“We are proud to work with Bell utilizing the WTTH solution to achieve the company’s high-speed broadband goals,” said Mao Dun, Vice President of Huawei’s Wireless Network Marketing & Solutions Sales. “TD-LTE technology is rapidly maturing. Other 5G-oriented technologies, including carrier aggregation, 8T8R and Massive MIMO, can deliver fibre-like access speeds while supporting Bell’s multiple services such as Fibe TV. We believe these advanced technologies will benefit all Canadians.”To read this article in full, please click here

BrandPost: Huawei enables Bell Canada’s Wireless to the Home (WTTH) Trials that put Canadian Rural Customers on the Path to 5G

Huawei and Bell Canada, the country’s largest communications company, today announced Bell’s successful Wireless to the Home (WTTH) trials in the 3.5 GHz and 28 GHz spectrum bands utilizing Huawei’s 5G-oriented Massive MIMO and 8T8R technology.The trials were conducted in the small Ontario communities of Orangeville, Feversham and Bethany to test and refine the capabilities of WTTH services for rural areas. As one of its next major steps in deploying high-speed home broadband in Canadian communities large and small, Bell plans deployment of WTTH to rural locations beginning in the second quarter of 2018.“We are proud to work with Bell utilizing the WTTH solution to achieve the company’s high-speed broadband goals,” said Mao Dun, Vice President of Huawei’s Wireless Network Marketing & Solutions Sales. “TD-LTE technology is rapidly maturing. Other 5G-oriented technologies, including carrier aggregation, 8T8R and Massive MIMO, can deliver fibre-like access speeds while supporting Bell’s multiple services such as Fibe TV. We believe these advanced technologies will benefit all Canadians.”To read this article in full, please click here

Final Slates of Nominees for the 2018 Internet Society Board of Trustees Elections

In the name of the Internet Society Nominations Committee, I am pleased to announce the final slates of nominees for the 2018 Internet Society Board of Trustees elections.

The ISOC  Nominations Committee received many responses to the call for applications, with the following regional and gender distribution of candidates:

Total applications received: 26

Regional distribution:

  • Africa: 7
  • Asia Pacific: 1
  • Europe: 4
  • Latin America and Caribbean: 6
  • North America: 8

Gender distribution:

  • Female: 3
  • Male: 23

The Nominations Committee chose a slate of 3 candidates for each election slate. One nominee, Stefano Trumpy, was added to the Chapters slate after he launched a successful petition. Therefore, the final slates consist of 3 candidates for the Organization Members election, and 4 candidates for the Chapters election.

The final slates are as follows. The candidates for each election slate are listed in alphabetical order by last name.

Organizations (one seat available)

  • Tejpal Bedi
  • Róbert Kisteleki
  • Robert Pepper

Chapters (one seat available)

  • Walid Al-Saqaf
  • Matthew Rantanen
  • Stefano Trumpy
  • Roberto Zambrana

Biographical information on all the candidates is available here:

https://www.internetsociety.org/board-of-trustees/elections/2018/nominees/

Voting representatives can expect to receive e-ballots from the ISOC Elections Committee by email on Thursday, 8 March and will have Continue reading

IDG Contributor Network: 6 key questions to answer when setting up an IoT center of excellence

Adopting IoT technology is a significant, company-wide undertaking. It requires a large dedication of resources and budget across multiple departments. Rightfully, the C-level has expectations for their investments. But before you can get to the payoff, there is an inordinate amount of decisions to be made and changes to endure. Not the least of which will be to learn new technology, establish new processes and define new job descriptions.But, because the result is so valuable to an organization’s bottom line – for example, greater yields of manufactured goods, extended life of decade’s old equipment, and more – tech leaders often compare the adoption of IoT technology to the early days of computers in business.   To read this article in full, please click here

OpenStack Stretches To The Edge, Embraces Accelerators

Since its inception, the OpenStack cloud controller co-created by NASA and Rackspace Hosting, with these respective organizations supplying the core Nova compute and Swift object storage foundations, has been focused on the datacenter. But as the “Queens” release of OpenStack is being made available, the open source community that controls that cloud controller is being pulled out of the datacenter and out to the edge, where a minimalist variant of the software is expected to have a major presence in managing edge computing devices.

The Queens release of OpenStack is the 17th drop of software since NASA and Rackspace first

OpenStack Stretches To The Edge, Embraces Accelerators was written by Timothy Prickett Morgan at The Next Platform.

Memcached servers can be hijacked for massive DDoS attacks

A flaw in the implementation of the UDP protocol for Memcached servers can allow anyone to launch a massive Distributed Denial of Service (DDoS) attack with little effort.The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings.Also read: Getting the most out of your next-generation firewall Memcached is a Web-based massive memory cache for database-drive sites, such as websites, that caches the most frequently retrieved data and keeps it in memory rather than getting it from the hard disk over and over again. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.To read this article in full, please click here

Memcached servers can be hijacked for massive DDoS attacks

A flaw in the implementation of the UDP protocol for Memcached servers can allow anyone to launch a massive Distributed Denial of Service (DDoS) attack with little effort.The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare. Since then, CDN specialist Akamai and security provider Arbor Networks have also published their findings.Also read: Getting the most out of your next-generation firewall Memcached is a Web-based massive memory cache for database-drive sites, such as websites, that caches the most frequently retrieved data and keeps it in memory rather than getting it from the hard disk over and over again. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory.To read this article in full, please click here

VMware Crafts Compute And Storage Stacks For The Edge

The rapid proliferation of connected devices and the huge amounts of data they are generating is forcing tech vendors and enterprises alike to cast their eyes to the network edge, which has become a focus of the distributed computing movement as more compute, storage, network, analytics and other resources are moving closer to where these devices live.

Compute is being embedded in everything, and this makes sense. The costs in time, due to latency issues, and money, due to budgetary issues, from transferring all that data from those distributed devices back to a private or public datacenter are too high

VMware Crafts Compute And Storage Stacks For The Edge was written by Jeffrey Burt at The Next Platform.

Geographic Information Systems (GIS) Field Upended by Neural Networks

On today’s episode of “The Interview” with The Next Platform, we focus on how geographic information systems (GIS) is, as a field, being revolutionized by deep learning.

This stands to reason given the large volumes of satellite image data and robust deep learning frameworks that excel at image classification and analysis–a volume issue that has been compounded by more satellites with ever-higher resolution output.

Unlike other areas of large-scale scientific data analysis that have traditionally relied on massive supercomputers, our audio interview (player below) reveals that a great deal of GIS analysis can be done on smaller systems. However,

Geographic Information Systems (GIS) Field Upended by Neural Networks was written by Nicole Hemsoth at The Next Platform.

BrandPost: Swisscom and Huawei Sign MoU on NetCity Project

At MWC 2018, Swisscom and Huawei announced they has signed a Memorandum of Understanding (MoU)  on NetCity project, intended to build a world-class, highly reliable, next-generation wireline network infrastructure that can provide customers in Switzerland with innovative products and services.NetCity, a project developed by Huawei and leading carriers for building the cities of the future, is intended to bring humanity a step closer to achieving a fully-connected, intelligent world by means of constructing a broadband, cloud-based and intelligent network architecture.The MoU marks an important step toward building a leading position for the two companies in technology, business and social responsibility. Working hand in hand on this project, Swisscom and Huawei will explore new concepts in wireline network deployment, developing innovative solutions that enable "zero-touch operations" for telecom and data center networks and accelerating the application of cloud computing, telemetry, AI, and Big Data on networks.To read this article in full, please click here

Information Gatekeeping: Not a Laughing Matter

There’s a joke that goes something like this: How do you make a little money in the online news business?

The punchline: Start with a huge pile of money, and work your way down from there.

It seems the same joke would work for the online comedy business, judging by the layoff news coming out of Funny or Die in January. Recently, Splitsider.com published an interesting Q&A with comedy veteran Matt Klinman, and he talked about the woes of online comedy outlets.

Klinman focused his ire on Facebook and its role as an information gatekeeper, in which the site determines what comedy clips to show each of its users. But much of his criticism could have just as easily been targeted at a handful of other online gatekeepers that point Internet users to a huge percentage of the original content that’s out there.

As Klinman says about Facebook, these services have created their own “centrally designed Internet” in which they serve as “our editor and our boss. They hide behind algorithms that they change constantly.”

As a thrice-laid-off online journalist, I can sympathize. I’m pretty sure I can’t blame any of the current gatekeepers for my 2002 layoff Continue reading

A Secure Supply Chain for Kubernetes

The beta release of the Docker Enterprise Edition (Docker EE) container platform last month integrates Kubernetes orchestration, running alongside Swarm, to provide a single container platform that supports both legacy and new applications running on-premises or in the cloud. For organizations that are exploring Kubernetes or deploying it in production, Docker EE offers integrated security for the entire lifecycle of a containerized application, providing an additional layer of security before the workload is deployed by Kubernetes and continuing to secure the application while it is running.

Mike Coleman previously discussed access controls for Kubernetes. This week we’ll begin discussing how Docker EE secures the Kubernetes supply chain.

What is a Software Supply Chain?

When you purchase something from a retail store, there is an entire supply chain that gets the product from raw materials to the manufacturer to you. Similarly, there is a software supply chain that takes an application from code on a developer’s laptop to production.

Every company’s software supply chain may be slightly different; some outsource software development, some have adopted Continuous Integration and Continuous Delivery processes, and some deploy production applications across multiple clouds, some on-premises. Regardless of what the software supply chain consists of, Continue reading