How to enable voice calls on 5G smartphones

Making voice calls on a 5G smartphone might not seem to be anything new and fancy. And from a consumer’s point of view, it isn’t. They’d expect a phone to still be a phone, even with the additional 5G label! But for mobile service providers, there are several things to consider and implement into a mobile network to make a voice service work over 5G. We prepared a ‘5G voice for dummies’ infographic, so you can learn the basics in 10 minutes.

Spotlight

eTouch Systems

eTouch Systems is a technology services company that specializes in Digital Web Engineering. We deliver technology services and accelerate growth for Global 1000 companies by solving complex business challenges with breakthrough technical innovations. We partner with leading global hi-tech enterprises to service their business and technology needs.

OTHER ARTICLES
Enterprise Mobility

A decade of open computing

Article | June 15, 2023

The third Annual OCP China Day, organized by the Open Compute Project (OCP) Foundation and hosted by Inspur, will be held on July 27, 2021 in Beijing. It marks another step in the right direction to popularizing open computing across the globe. This year is the tenth anniversary of the open compute project and the theme of OCP China Day is “Open compute for a new decade: Decarbonization, Efficiency, Adoption”. Omdia has tracked the open computing market in detail for 5 years and over that period we have seen the end-user base expand and adoption take off. We expect 40% of the servers shipped in 2025 to be developed based on open standard, up from 7% in 2016. This is a very significant number, partularly given that our forecast takes into account large scale adoption at only two or three of the hyperscale cloud service providers. Most of the net new deployments are expected to be at tier-2 cloud, communication service providers and enterprises, including the public or government sector.

Read More
Network Infrastructure, Network Management

Why Security Vulnerability Assessments Are Necessary?

Article | July 10, 2023

Cybercrimes have increasingly become a matter of concern for companies worldwide. Over the past few years, the rise of big-ticket ransomware attacks and exposure of perilous software supply chain infections has awakened organizations to various digital dangers. So, the big question is, how to combat the security threats that are on meteoric growth? The best solution is to adopt a security vulnerability assessment. What is Security Vulnerability Assessment? A vulnerability assessment involves a systematic review of security hazards, which helps identify IT infrastructure’s weaknesses, risks, and vulnerabilities. When it comes to mitigating vulnerabilities and resolving issues, the collective imperative is to analyze the problem areas before getting them fixed. A security assessment is critically important to combat the complexities and with an effective vulnerability assessment program, organizations use the tools required to comprehend the probable security weaknesses and enable the protection of systems and data from intruders and unauthorized breaches. For most organizations, ensuring the safety of devices, networks, applications, and digital assets are part of a broader vulnerability management strategy. It includes an extensive assessment, in-depth processes, and mitigation methods to explore the entire threat spectrum. Typically, it is conducted regularly. Vulnerability assessment offers a firm assurance in the security of data, especially when some alterations have been implemented or a new service has been added, or, for that matter, and installation of new equipment has taken place. Each assessment provides a perspective about the risk in its periphery and suggests solutions to control the risk factors and the evolving threats. Why Security Vulnerability Assessment Is Necessary? The perpetual threat of cybercrime has necessitated the demand for vulnerability assessments significantly. They make organizations realize their security defects and contribute towards mitigating them. Hackers are forever ready to make phishing attacks. As per reports, hackers are at work every 39 seconds. Thus, it is extremely important to be vigilant or complacent to activate hackers’ and cybercriminals’ machinations. Over the period, cybercrimes are fluctuating and thus need ongoing attention. The ideal solution is to undertake consistent vulnerability assessments to safeguard confidential data, systems, and networks. Furthermore, it helps organizations understand the risk and enables smart decision-making. To ensure security, companies ought to conduct both external and internal scans of their networks. According to Gartner (paywall), “Large organizations with thousands of employees, tens of thousands of servers and many operating systems receive hundreds of requests per year to patch thousands of vulnerabilities that cannot be remediated in less than 15 days.” One of the best reasons security vulnerability assessments are important is because it confirms an enterprise’s management processes and whether it has covered every critical patch through outlined existing remediation. Why Do Companies Need Vulnerability Assessment? A vulnerability assessment provides companies insightful details on all types of security discrepancies in their environment. It paves ways to evaluate the risks associated with the flaws. This helps organizations have a better knowledge of their security scare, overall weaknesses, and assets. Moreover, the first thing that strikes us on hearing about a cyber-attack is the security of data. With the right and adequate implementation of security assessments, the safety and security of important data could be easily protected. A security assessment would be helpful to reduce irrelevant expenses and make space and increase the IT budget to invest in other key aspects. Undoubtedly, data breach causes substantial loss to an organization, which leads to legal hassles and financial hazards. In fact, most of the time companies fail to recover the loss. Thus, it doesn’t harm to place solid policies and methods to strengthen the entire security position of the organization and this can only be possible with a strategic security vulnerability assessment. In a nutshell, this would keep the companies aware and, in all likelihood, keep the cyber-criminals at bay. A CASE STUDY ANALYSIS To cite an example, let’s take how Zensar conducted a three-pronged vulnerability assessment with port scan and penetration scanning. It determined the security of its offerings to meet customer requests for Brainshark, a leading provider of on-demand presentation solutions, helping customers deliver business interaction across 600+ ranking companies in the market. While Brainshark knew their systems were secure and could also establish it through their documentation, they still undertook a third-party security vulnerability assessment. Zensar’s vulnerability assessment procedures were based on the industry’s best practices that included tests for SQL injection, cookie manipulation, access control weakness, session state, and cross-site scripting. The focus of the test was to identify the host and application security concerns. Upon completing the tests and assessments, Brainshark expressed satisfaction and was confident enough in their ability and solution. They knew their security posture was highly protected and secure. Types of Vulnerability Assessments: Vulnerability assessments unearth a variety of system and network vulnerabilities. This indicates the reliability of the assessment process, which is implemented with different tools, scanners, and methods that helps discover the vulnerabilities, risks, and threats. Network-based assessment scanning: It is used to determine the presumptive network security attacks. This kind of scanning can also detect the vulnerable systems on wired as well as wireless networks. Host-based scans: It is easy to locate the vulnerabilities in servers or other network hosts with host-based scanning. This type of scanning provides visibility into the configuration settings and legacy systems. Database scans: Database scans ascertain the weak points in a database to preclude malefic attacks. Application Scans: It examines websites to identify and recognize software vulnerabilities and inaccurate configurations in network or web applications. Summing Up Organizations need to be watchful every minute and ensure the security posture is rigorous, which is only possible with security vulnerability assessments. Based on this criterion, understanding company risks gets simplified in turn preventing intrusions and threats. FREQUENTLY ASKED QUESTIONS What Are the Advantages of Security Vulnerability Assessment? There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks. What Are the Disadvantages of Security Vulnerability Assessment? While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too. { "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [{ "@type": "Question", "name": "What Are the Advantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "There are several advantages attached to security vulnerability assessments. To put it precisely, it can help identify the vulnerabilities before cybercriminals do and determine the level of risk. Undoubtedly, opting for vulnerability assessment would save a lot of time and money and mitigate the risk and prevent the irrelevant expenditure that follows after the cyber-attacks." } },{ "@type": "Question", "name": "What Are the Disadvantages of Security Vulnerability Assessment?", "acceptedAnswer": { "@type": "Answer", "text": "While vulnerability assessments are highly advisable, it has its share of drawbacks which cannot be ignored. One of the primary limitations of vulnerability assessment is that it does not hint at every vulnerability that exists. Moreover, it sometimes signals false positives too." } }] }

Read More
Network Management, Network Security

5G with AI: The Future of Business Has Arrived

Article | July 17, 2023

The cloud, robotics, automation, and digital technologies are indispensablefor efficient, adaptable, and dynamic business operations. Artificial intelligence and 5G have evolved to become two of the most revolutionary technologies of the decade. While 5G and AI are capable ofindependently revolutionizing industries and facilitating future experiences, combining the two will be ground-breaking. The combination of AI with 5G mobile technology has the potential to transform business and society, paving the wayfor new products and services that were previouslyunimaginable.So, let’s check out how AI and 5G can revamp and upgrade businesses. AI with 5G: Making Network and Devices Better Using AI on 5G networks and devices will enhance wireless communication and battery, and most importantly, improve the user experience. With the help of machine learning, you can now focus on major wireless issues that are tough to tackle with traditional methods. The wireless industry has been talking about the ways in which AI can improve 5G networks.AI will significantly impactthe fundamental aspects of 5G network management, including efficiency, deployment, service quality, and security. One of the less-discussed aspects is how on-device AI will enhance the 5G end-to-end system. Radio frequency awareness (RFA) is at the center of 5G improvements and AI's involvement in the process.Instead of a hand-crafted algorithm, machine learning can decipher the device's RF signals. Improved radio awareness increases device experience, system performance, and radio security. Embracing 5G for Future Telecom & Business Operations The fifth generation of mobile technology comes with many use cases that are enough to completely transform almost every industry. As the world gets ready for a substantial transformation, it's important to know what they are and how they can help your business. Presently, 5G is driving three significant global trends. 5G technology will alter connected devices by driving consumer adoption, making them smarter, and making large-scale device integration easier. Cloud and edge computing depend on accessibility, and 5G will make cloud and edge computing more powerful and accessible than ever before. As 5G allows algorithms to be much more efficient at collecting and analyzing data at scale, AI becomes more accessible and fundamental for businesses powered by 5G. This can be considered a scientific and ethical endeavor. PartingThoughts Like any new technology, there is indeed a lot of hype around 5G's debut. 5G and AI are two synergistic, necessary components driving future advancements. Those whocombine these technologies will have a competitive edge and the opportunity to build future forward brands.Businesses that adopt 5G will not only witness revenue gain but will also emerge as an influential player in the future.

Read More
Enterprise Mobility

The Best Router Security Configurations for Your Business WiFi Network

Article | June 28, 2022

Wi-Fi and the Internet have become an indispensable part of our daily lives. Because of the importance and convenience of a business Wi-Fi network, it is now a must-have service for most businesses. Unfortunately, numerous small-to-medium-sized businesses lack the resources and cyber skills required to appropriately secure their networks. This can be a major issue because an unsecured network exposes the company to attacks from hackers looking to steal valuable company information or customer data. How Can Businesses and IT Leaders Strengthen Their Wi-Fi Security? A data breach can cripple your business. It not only undermines consumer trust, but data breaches cost an average of $4.24 million. Fortunately, improving your Wi-Fi security is not difficult. To safeguard your company's wireless Internet connection, follow the steps outlined below. Use Up-To-Date Wi-Fi Encryption You should upgrade your hardware if it can only support WEP or WPA encryption. The Wi-Fi Alliance strongly encourages the widespread use of WPA2. Cutting-edge encryption has been demonstrated to be protected against even the most persistent attackers when correctly implemented. If you run an enterprise environment, you should take advantage of the extra security provided by specific digital certificates. Encrypt Wi-Fi Router Administration Pages Taking your Wi-Fi security a step further needs the use of a Wi-Fi digital certificate to secure your admin login pages. Self-signed certificates that come pre-installed on a few routers are untrusted, easy to copy, and prone to Man-In-The-Middle (MITM) attacks. TLS certificates from reputable certificate authorities can ensure that all of your Wi-Fi connectivity is safe and confidential. If your router's quick start guide does not contain digital certificates, you can obtain information on the manufacturer's support page. Consider Restricting MAC addresses Smaller network managers can lock down MAC addresses for more control. Wireless routers and access points use MAC (Media Access Control) address filtering to block attacks. Every WiFi-enabled device has a unique MAC or physical address and a list of connected devices. You can manually enter addresses to define network access, but hackers can fake MAC addresses. Use Always-On SSL You must utilize HTTPS across your website and apply it to Wi-Fi. Accessing an account on an encrypted page and subsequently interacting with the site through unencrypted pages exposes the user to session-side jacking. Create a Guest AP with Tighter Security Not all businesses must enable guests or customers to connect to their networks, but some companies do offer guests access by providing them with guest login credentials. If your company falls into this category, set up a dedicated guest AP that is isolated from the rest of the company network. You can set up a second AP on your router and utilize a firewall to limit access from that AP to certain services that you want your visitors to be able to access. Closing Lines Nowadays, having an internet connection is critical for organizations, as is keeping it secure from hackers. Moreover, when conducting business, it is crucial to keep critical information and customer data secure. Otherwise, you risk compromising your company's image. So, if you want to maintain your Wi-Fi network security and keep your business working effectively, you must adhere to a few fundamental principles. Finally, you are on the path to make your Wi-Fi network safer and more robust by following all of these techniques at once or step by step.

Read More

Spotlight

eTouch Systems

eTouch Systems is a technology services company that specializes in Digital Web Engineering. We deliver technology services and accelerate growth for Global 1000 companies by solving complex business challenges with breakthrough technical innovations. We partner with leading global hi-tech enterprises to service their business and technology needs.

Related News

Enterprise Mobility,Mobile OS

MATRIXX Software’s Digital Commerce Platform Available in Microsoft’s Azure Marketplace

MATRIXX | January 27, 2023

5G monetization solutions leader, MATRIXX software, yesterday announced that the MATRIXX Digital Commerce Platform (DCP) is now available on the Microsoft Azure Marketplace, an online store providing software and services to be used with the Azure cloud computing platform. MATRIXX DCP, a cloud native monetization platform gives Communications Services Providers (CSPs) a wide range of monetization options, making it simpler to take advantage of 5G revenue prospects. By installing MATRIXX DCP on Azure Kubernetes Service (AKS), CSPs may take full advantage of the reliable Azure cloud platform's benefits for the vital goal of monetizing new and cutting-edge services. With a no-code, cloud-native, real-time platform, MATRIXX DCP, a 3GPP-compliant converged charging solution, enables telcos to monetize at web scale. With MATRIXX DCP, operators can scale swiftly in the 5G era and beyond, create differentiated digital consumer experiences, and drive innovation. Marc Price, CTO at MATRIXX Software, said, “Multi-cloud deployments are increasingly important for operators around the world, and are defining the next era of telecommunications.” He further added, “MATRIXX empowers our customers to have access to advanced monetization capabilities, wherever they choose to deploy. Microsoft is a trusted cloud ecosystem partner for CSPs, and with MATRIXX DCP in the Microsoft Azure Marketplace, telcos can easily procure and deploy monetization capabilities for emerging services.” About MATRIXX Software Matrix Software provides converged charging and commerce solutions. It’s cloud-native Digital Commerce Platform offers mission-critical, network-grade software that opens new prospects for network monetization. MATRIXX gives service providers the agility they need to quickly build, deploy, and monetize new products and services because to its no-code configuration features. Many of the world’s top IoT players, network infrastructure providers, and communications firms run on the MATRIXX platform. Utilizing business innovation and on-demand customer experience through MATRIXX enables businesses to compete better, produce new revenue, and pursue growth possibilities across markets and verticals.

Read More

Wan Technologies,Wireless,5G

AMD and Viettel Collaborate on 5G Mobile Network Expansion

AMD | December 05, 2022

AMD and Viettel High Tech (Member of Viettel Group) today announced the successful completion of a 5G mobile network field trial deployment conducted by Viettel and powered by AMD Xilinx Zynq™ UltraScale+™ MPSoC devices. As the largest telecom operator in Vietnam serving more than 130 million mobile customers, Viettel High Tech has a rich history of using AMD radio technology with prior 4G deployments and is now accelerating new networks via new 5G remote radio heads. Designed to meet the growing capacity and performance requirements of mobile users globally, the Viettel 5G mobile network is expected to be completed by the end of 2022. AMD is the exclusive radio unit silicon supplier for Viettel’s indigenous 5G radio development. After the successful completion of the first field trial, Zynq MPSoCs are now set to be extended to an additional 300 Macro 8T8R base stations and 900 5G 8T8R Macro radios. The Zynq UltraScale+ MPSoC was also chosen by Viettel for its first-generation 64T64R Massive MIMO radio which is currently being optimized for field trials. Viettel is developing the next generation of radios to also include Zynq UltraScale+ RFSoC devices, to provide industry-leading integration and higher performance. “Viettel is committed to advancing mobile technology leadership by working closely with AMD to incorporate its adaptable SoC technology into our new generation of 5G networks. Going from VHT's history of making 4G BTS, this decision to scale for the growing demands of 5G was based on evaluating various factors including flexibility, simplification, design stability and the experience of engineers.” Nguyen Vu Ha, general director of Viettel High Tech “5G provides new opportunities to offer higher levels of performance, power efficiency and new services along with increased reliability required to meet the growing data demands of cellular networks,” said Yousef Khalilollahi, corporate vice president of APAC sales, Adaptive and Embedded Computing Group, AMD. “We are proud of our close collaboration with Viettel and remain focused on enabling its mobile network to deliver the optimal end-user experience as well as the flexibility to evolve and grow as Viettel’s user base and required bandwidth continue to increase globally.” About Viettel High Tech As the R&D arm of Viettel Group, Viettel High Tech develops full 5G network architecture including 5 layers: Service/App layers, Core layers, Transportation layers, Access layers, Devices; makes Vietnam one of the few countries that can produce 5G equipment. Collaboration with the leading partners is VHT’s strategy. With the desire to experiment, exchange knowledge, further develop diverse fields, VHT is moving to accompany the international high-tech community. About AMD For more than 50 years AMD has driven innovation in high-performance computing, graphics and visualization technologies. Billions of people, leading Fortune 500 businesses and cutting-edge scientific research institutions around the world rely on AMD technology daily to improve how they live, work and play. AMD employees are focused on building leadership high-performance and adaptive products that push the boundaries of what is possible.

Read More

Network Infrastructure,Network Management,Wan Technologies

Verizon continues to deploy 5G Ultra Wideband faster than expected

Verizon | December 06, 2022

Verizon now covers more than 175 million people with their ultra fast, ultra reliable 5G Ultra Wideband service, and will offer nationwide 5G Ultra Wideband in Q1 2023. The ongoing C-Band rollout is a full 13 months ahead of the original schedule, and continues to accelerate. Less than 21 months after announcing the results of the FCC’s C-band auction and after securing early access to an additional 30 markets this year, Verizon accelerated its build plan and surpassed its goal of reaching 175 million people covered by the end of 2022, a month ahead of schedule. “Our customers don’t stand still and neither does our network. Today, more than one out of every two Americans now have access to 5G Ultra Wideband. We know our customers rely on our service every day and we work for them – continuously enhancing, expanding and improving our wireless network. And as proud as I am to have crossed this milestone, I am equally proud of the way we are building our network – with the most advanced technologies, industry leading security, a robust fiber underpinning and a robust and varied spectrum portfolio. We are building this right. We are building this as a platform for innovation for years to come.” Hans Vestberg, Chairman and CEO of Verizon. Verizon’s 5G Ultra Wideband brings power and performance comparable to a wired broadband internet connection to customers’ pockets. With download speeds up to one gigabit per second and the capacity to support data-heavy actions, 5G Ultra Wideband frees people up to do things on the go that many could only do before when connected to their home internet service. This includes everything from downloading huge documents and seamlessly streaming movies in HD audio and video, to playing console quality games and conducting video chats, video conferencing and FaceTime calls with clear sound and video. Verizon customers have much more to look forward to Verizon will continue to build out its 5G Ultra Wideband network using C-band spectrum providing service for millions more customers in the coming months, but Verizon’s engineers are not losing sight of the other critical components that will give customers the most reliable, secure, and robust experience possible on the Verizon network. In addition to providing greater coverage, especially in rural and suburban areas, Verizon will also enhance capacity by activating 100 MHz of C-Band spectrum in many markets, a significant step up from the 60 MHz of spectrum available when deployment first began. Once all of its licensed spectrum is made available, Verizon will have up to 200 MHz of C-Band spectrum deployed in many markets, which will provide exceptional speed and capacity. Complementing the wide coverage of Verizon’s premier C-Band spectrum, Verizon will continue deploying 5G on mmWave spectrum which provides for exponential capacity in areas with significantly dense populations such as venues, stadiums, arenas, airports, major metro areas, office complexes and more. mmWave will also continue to be used for private network deployments when enterprise customers need the fastest, most robust 5G service available for their enterprise applications from wireless manufacturing solutions to connected vehicles to remote healthcare and more. In addition to making 5G more accessible to more people, Verizon will continue focusing on building out the advanced technologies that provide increased security, reliability and customized experiences for customers. Those advancements include fully deploying the 5G core with Verizon’s proprietary cloud platform built specifically for telco workloads, advancing the fiber network to handle exponential increases in data traffic, continuing massive virtualization of the network to add programmability and flexibility into the network, using artificial intelligence to drive reliability and performance, continuing to develop edge computing capabilities to drive down latency, and continuing to advance antenna configurations to drive speed and efficiency.

Read More

Enterprise Mobility,Mobile OS

MATRIXX Software’s Digital Commerce Platform Available in Microsoft’s Azure Marketplace

MATRIXX | January 27, 2023

5G monetization solutions leader, MATRIXX software, yesterday announced that the MATRIXX Digital Commerce Platform (DCP) is now available on the Microsoft Azure Marketplace, an online store providing software and services to be used with the Azure cloud computing platform. MATRIXX DCP, a cloud native monetization platform gives Communications Services Providers (CSPs) a wide range of monetization options, making it simpler to take advantage of 5G revenue prospects. By installing MATRIXX DCP on Azure Kubernetes Service (AKS), CSPs may take full advantage of the reliable Azure cloud platform's benefits for the vital goal of monetizing new and cutting-edge services. With a no-code, cloud-native, real-time platform, MATRIXX DCP, a 3GPP-compliant converged charging solution, enables telcos to monetize at web scale. With MATRIXX DCP, operators can scale swiftly in the 5G era and beyond, create differentiated digital consumer experiences, and drive innovation. Marc Price, CTO at MATRIXX Software, said, “Multi-cloud deployments are increasingly important for operators around the world, and are defining the next era of telecommunications.” He further added, “MATRIXX empowers our customers to have access to advanced monetization capabilities, wherever they choose to deploy. Microsoft is a trusted cloud ecosystem partner for CSPs, and with MATRIXX DCP in the Microsoft Azure Marketplace, telcos can easily procure and deploy monetization capabilities for emerging services.” About MATRIXX Software Matrix Software provides converged charging and commerce solutions. It’s cloud-native Digital Commerce Platform offers mission-critical, network-grade software that opens new prospects for network monetization. MATRIXX gives service providers the agility they need to quickly build, deploy, and monetize new products and services because to its no-code configuration features. Many of the world’s top IoT players, network infrastructure providers, and communications firms run on the MATRIXX platform. Utilizing business innovation and on-demand customer experience through MATRIXX enables businesses to compete better, produce new revenue, and pursue growth possibilities across markets and verticals.

Read More

Wan Technologies,Wireless,5G

AMD and Viettel Collaborate on 5G Mobile Network Expansion

AMD | December 05, 2022

AMD and Viettel High Tech (Member of Viettel Group) today announced the successful completion of a 5G mobile network field trial deployment conducted by Viettel and powered by AMD Xilinx Zynq™ UltraScale+™ MPSoC devices. As the largest telecom operator in Vietnam serving more than 130 million mobile customers, Viettel High Tech has a rich history of using AMD radio technology with prior 4G deployments and is now accelerating new networks via new 5G remote radio heads. Designed to meet the growing capacity and performance requirements of mobile users globally, the Viettel 5G mobile network is expected to be completed by the end of 2022. AMD is the exclusive radio unit silicon supplier for Viettel’s indigenous 5G radio development. After the successful completion of the first field trial, Zynq MPSoCs are now set to be extended to an additional 300 Macro 8T8R base stations and 900 5G 8T8R Macro radios. The Zynq UltraScale+ MPSoC was also chosen by Viettel for its first-generation 64T64R Massive MIMO radio which is currently being optimized for field trials. Viettel is developing the next generation of radios to also include Zynq UltraScale+ RFSoC devices, to provide industry-leading integration and higher performance. “Viettel is committed to advancing mobile technology leadership by working closely with AMD to incorporate its adaptable SoC technology into our new generation of 5G networks. Going from VHT's history of making 4G BTS, this decision to scale for the growing demands of 5G was based on evaluating various factors including flexibility, simplification, design stability and the experience of engineers.” Nguyen Vu Ha, general director of Viettel High Tech “5G provides new opportunities to offer higher levels of performance, power efficiency and new services along with increased reliability required to meet the growing data demands of cellular networks,” said Yousef Khalilollahi, corporate vice president of APAC sales, Adaptive and Embedded Computing Group, AMD. “We are proud of our close collaboration with Viettel and remain focused on enabling its mobile network to deliver the optimal end-user experience as well as the flexibility to evolve and grow as Viettel’s user base and required bandwidth continue to increase globally.” About Viettel High Tech As the R&D arm of Viettel Group, Viettel High Tech develops full 5G network architecture including 5 layers: Service/App layers, Core layers, Transportation layers, Access layers, Devices; makes Vietnam one of the few countries that can produce 5G equipment. Collaboration with the leading partners is VHT’s strategy. With the desire to experiment, exchange knowledge, further develop diverse fields, VHT is moving to accompany the international high-tech community. About AMD For more than 50 years AMD has driven innovation in high-performance computing, graphics and visualization technologies. Billions of people, leading Fortune 500 businesses and cutting-edge scientific research institutions around the world rely on AMD technology daily to improve how they live, work and play. AMD employees are focused on building leadership high-performance and adaptive products that push the boundaries of what is possible.

Read More

Network Infrastructure,Network Management,Wan Technologies

Verizon continues to deploy 5G Ultra Wideband faster than expected

Verizon | December 06, 2022

Verizon now covers more than 175 million people with their ultra fast, ultra reliable 5G Ultra Wideband service, and will offer nationwide 5G Ultra Wideband in Q1 2023. The ongoing C-Band rollout is a full 13 months ahead of the original schedule, and continues to accelerate. Less than 21 months after announcing the results of the FCC’s C-band auction and after securing early access to an additional 30 markets this year, Verizon accelerated its build plan and surpassed its goal of reaching 175 million people covered by the end of 2022, a month ahead of schedule. “Our customers don’t stand still and neither does our network. Today, more than one out of every two Americans now have access to 5G Ultra Wideband. We know our customers rely on our service every day and we work for them – continuously enhancing, expanding and improving our wireless network. And as proud as I am to have crossed this milestone, I am equally proud of the way we are building our network – with the most advanced technologies, industry leading security, a robust fiber underpinning and a robust and varied spectrum portfolio. We are building this right. We are building this as a platform for innovation for years to come.” Hans Vestberg, Chairman and CEO of Verizon. Verizon’s 5G Ultra Wideband brings power and performance comparable to a wired broadband internet connection to customers’ pockets. With download speeds up to one gigabit per second and the capacity to support data-heavy actions, 5G Ultra Wideband frees people up to do things on the go that many could only do before when connected to their home internet service. This includes everything from downloading huge documents and seamlessly streaming movies in HD audio and video, to playing console quality games and conducting video chats, video conferencing and FaceTime calls with clear sound and video. Verizon customers have much more to look forward to Verizon will continue to build out its 5G Ultra Wideband network using C-band spectrum providing service for millions more customers in the coming months, but Verizon’s engineers are not losing sight of the other critical components that will give customers the most reliable, secure, and robust experience possible on the Verizon network. In addition to providing greater coverage, especially in rural and suburban areas, Verizon will also enhance capacity by activating 100 MHz of C-Band spectrum in many markets, a significant step up from the 60 MHz of spectrum available when deployment first began. Once all of its licensed spectrum is made available, Verizon will have up to 200 MHz of C-Band spectrum deployed in many markets, which will provide exceptional speed and capacity. Complementing the wide coverage of Verizon’s premier C-Band spectrum, Verizon will continue deploying 5G on mmWave spectrum which provides for exponential capacity in areas with significantly dense populations such as venues, stadiums, arenas, airports, major metro areas, office complexes and more. mmWave will also continue to be used for private network deployments when enterprise customers need the fastest, most robust 5G service available for their enterprise applications from wireless manufacturing solutions to connected vehicles to remote healthcare and more. In addition to making 5G more accessible to more people, Verizon will continue focusing on building out the advanced technologies that provide increased security, reliability and customized experiences for customers. Those advancements include fully deploying the 5G core with Verizon’s proprietary cloud platform built specifically for telco workloads, advancing the fiber network to handle exponential increases in data traffic, continuing massive virtualization of the network to add programmability and flexibility into the network, using artificial intelligence to drive reliability and performance, continuing to develop edge computing capabilities to drive down latency, and continuing to advance antenna configurations to drive speed and efficiency.

Read More

Events