Accelerating the Virtual Infrastructure for Open RAN

Dell Technologies and Altiostar partner to accelerate adoption of open and virtualized RAN Over the last several years, 5G has been a cornerstone of the telecommunications industry technology development  – defining a radio air interface and technology architecture for the core network. Now that the promise of 5G is becoming a reality, industries looking to transform are implementing new use cases for 5G that are defining new network “edges” that foundationally change traffic flows and data analytics pipelines in Telecom networks. The snowball effect of the NFV transition started in 2012 with a focus on 4G … READ MORE

Related:

  • No Related Posts

Enabling 5G Use Cases at the Edge

The industry really can’t stop talking about the edge. In the interest of not starting a classic “edge” conversation with a definition, let’s focus very specifically about its role as a new business model for 5G. From a Telco perspective, 5G enables a whole range of new applications and services that will open the doors to new revenue streams and provide a path to differentiation. Aligning business outcomes to vertical industry requirements to operating models to technology enablers has become the foundation for how Dell Technologies is discussing the edge with our Telco customers and partners … READ MORE

Related:

  • No Related Posts

5 Ways 5G Will Impact Your Life

5G is cool. It’s all the buzz these days in the tech business world and for consumers. You’ve seen it on every single telecom commercial as they race to 5G, and you’ve heard about how ‘fast your cell phone will be.’ I can assure you 5G promises much more than a faster cell phone. But what exactly is 5G and what will it mean for you? Here are the top 5 ways I believe 5G will impact your life: Telehealth: There are many use cases that could save lives via faster diagnosis. For example during the … READ MORE

Related:

  • No Related Posts

Maslow’s Hierarchy of Needs, Applied to 5G

From architecture to operations, 5G networks have the potential to drive industries towards digital transformation in ways that we’ve not seen with prior generations of mobile technologies. Whether it be the architectural flexibility to add new capabilities incrementally (prior G’s required end-to-end generational updates), or the industry-centric perspective of 5G use-cases (prior G’s focused on singular consumer experience), I often find that my team and I focus extensively on Four Pillars of 5G Transformation: Network Modernization, towards a virtualized and software-defined network IT and OSS/BSS Transformation towards data-driven decisions Digital Transformation, delivering joint enterprise solutions in … READ MORE

Related:

  • No Related Posts

5G and Me: And Manufacturing

How can 5G accelerate manufacturing? With its increased speed, higher bandwidth and lower latency, fifth-generation wireless cellular technology, or 5G, has the potential to be a key enabler and accelerator of the next generation of smart manufacturing. Some advantages of this communications technology for industrial applications include: Higher Bandwidth – modern IIoT gateways and distributed edge compute architectures are creating an explosion of valuable plant data and 5G networks are ideally suited to keep up with this data deluge Lower Latency – allowing devices to communicate more quickly and reliably is especially important for machine-to-machine communications … READ MORE

Related:

  • No Related Posts

Key Negotiation of Bluetooth Vulnerability

A weakness in the Bluetooth Basic Rate/Enhanced Data Rate (BR/EDR) protocol core specification exposes a vulnerability that could allow for an unauthenticated, adjacent attacker to perform a man-in-the-middle attack on an encrypted Bluetooth connection. The attack must be performed during negotiation or renegotiation of a paired device connection; existing sessions cannot be attacked.

The issue could allow the attacker to reduce the entropy of the negotiated session key that is used to secure a Bluetooth connection between a paired device and a host device. An attacker who can successfully inject a malicious message into a Bluetooth connection during session negotiation or renegotiation could cause the strength of the session key to be susceptible to brute force attack.

This advisory will be updated as additional information becomes available. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190813-bluetooth

Security Impact Rating: Medium

CVE: CVE-2019-9506

Related:

Not Just Another G: What Users Want

This is the third installment in our series Not Just Another G, which provides insight into 5G and what it means to the service provider industry so they can help the end users achieve what they want. Missed the first two posts? Catch up here. User experiences and workloads are driving the next generation of mobile computing. They have a direct impact on the evolution of wireless architecture and compute infrastructure to best meet the connectivity, latency and compute processing needs. 5G is a direct manifestation of what users want and Dell Technologies is helping service … READ MORE

Related:

Not Just Another G: The Next Generation

This is the second installment in our series Not Just Another G, which provides insight into 5G and what it means to the service provider industry. Missed the first post? Catch up here. The next-generation 5G architecture is built around the realization that different services are consumed differently, and by different types of users. Thus, next-generation mobile access technology must have: A way to define those differences, A way to determine and place constraints so as to meet those differences, and A way to architect access methods that meet the goals of the different services that … READ MORE

Related:

  • No Related Posts