5G Transport Networks

May 15, 2018

The upcoming 5G standard has grabbed the industry spotlight. 3GPP divided 5G in two phases: Phase 1 (Rel-15) and Phase 2 (Rel-16). However, 3GPP agreed an accelerated plan for 5G deployment at the RAN plenary meeting held in March 2017 in Dubrovnik, Croatia. This means that 5G will come earlier than was originally envisaged.  

Spotlight

Sophos

More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs—a global network of threat intelligence centers.

OTHER WHITEPAPERS
news image

Game-Changing Business Model: Private LTE for AMI and Smart Utility Programs

whitePaper | December 1, 2019

The landscape of telecommunications options available to support utilities’ Operational Technology (OT) solutions is rapidly evolving - at a pace compared only by the changing needs of the OT requirements themselves. As utilities replace first generation Advanced Metering Infrastructure (AMI) solutions with current more feature-rich systems and expand the reach of traditional Distribution Automation (DA), Field Mobility (FM) and other existing solutions; new options are required for device connectivity and backhaul. The potential explosion of ubiquitous Internet of Things (IoT) devices will further change the utilities’ needs.

Read More
news image

A Guide to NetOps and SecOps Collaboration

whitePaper | May 1, 2021

This white paper draws on EMA research to offer a step-by-step guide for building partnerships and collaboration between enterprise network and security teams. It explores why this collaboration is essential, and how enterprises can reap rewards from NetOps and SecOps partnerships. In particular, it reviews how tools, data, and processes are essential to success.

Read More
news image

Heavy Reading: 5G edge cloud infrastructure and security

whitePaper | July 20, 2021

See what Heavy Reading analysts discovered when they conducted research on digital service provider best practices and key considerations for building secure, fast 5G and edge computing networks.

Read More
news image

Ericsson Mobility Report

whitePaper | June 1, 2021

Ericsson Mobility Report provides industry-leading projections and analyses of the latest trends in the mobile industry, including subscription, mobile data traffic and population coverage. Our forecasts are based on past and current data, validated with extensive network measurements. Read the report to learn about the latest figures for 5G, IoT, fixed wireless access and more.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | October 10, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security.

Read More
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevail in the Future

whitePaper | November 22, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More

Spotlight

Sophos

More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs—a global network of threat intelligence centers.

Events