Instant access, low-latency, always on and always connected. That’s the world we live in today. And as the demand for bandwidth increases at an accelerating pace, new solutions for transport networks are needed. The problem is the dominant networking technologies used today-synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) networks-are growing obsolete.
The alarm goes off at 6:30 am. A notification pops up on the smart device that sends a request to my driver to pick me from my home and drop me off at the airport for a meeting at 8:30 am. All of this happens without me having to tell my driver about the airport drop. In less than two hours I’m at the airport; courtesy of connected things and the connected ecosystem.
As the world transitions from 4G to 5G, lots of applications are moving toward the cloud, which heralds the commercialization of transformative technologies such as augmented reality (AR), connected vehicle and Internet of Things (IoT). Most of these technologies rely on mobile infrastructure and cloud computing that together provide real-time, context-based services to the end user.
How are today's advanced technologies and the digital transformation shaping both the present and future of the utility industry? Aricent’s Stuart Borlase is the Editor-in-Chief and co-author of the second edition of a book that highlights the latest technologies, business drivers, benefits and market outlook of the smart grid initiative.
Her, the 2014 winner of the Academy Award for Best Original Screenplay, depicts a romantic relationship between a loner and his charming advanced operating system (OS). While the premise may seem outlandish, what rings true is the significant role that artificial intelligence (AI) plays in our lives.
A spate of news reports have revealed just how vulnerable corporations and government organizations are to security breaches and the theft of sensitive data leaked or stolen from employees’ personal devices. In 2014, a warning issued by the Indian Air Force sent alarms among security establishments. It was reported that smart-phones were routing positioning and other user-data to servers in China.