Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

Response redefined – ICT and the future of public safety

by Ericsson

Mobile broadband and distributed computing, coupled with industry-wide standardization efforts, can transform emergency response. This paper explains how to use ICT architecture and consulting frameworks to create truly mission-critical, multiagency platforms that enable effective communications and information sharing. At the same time, factors such as affordability and ease of implementation should lead agencies to embrace solutions based on open standards.
» Read more

5G systems – enabling the transformation of industry and society

by Ericsson

A digital transformation is taking place in almost every industry, disrupting and making us rethink our ways of working. Through an unprecedented ability to share information, people and industries are collaborating more, creating solutions that combine many different areas of expertise and overturning traditional business models. This cross-industry transformation has created a need to evolve wireless connectivity for the fifth generation of mobile technology. The goal is to expand the broadband capability of mobile networks, and to provide specific capabilities for consumers and for various industries and society at large unleashing the potential of the Internet of Things.
In this paper, the 5G use cases and their respective requirements are outlined first. The evolution of the network components toward 5G is then presented, followed by a description of the 5G system. Finally, the 5G system is exemplified through three concrete use cases.
» Read more

5G radio access – capabilities and technologies

by Ericsson

The capabilities of 5G wireless access must extend far beyond previous generations of mobile communication. Examples of these capabilities include very high data rates, very low latency, ultra-high reliability, energy efficiency and extreme device densities, and will be realized by the development of LTE in combination with new radio-access technologies. Key technology components include extension to higher frequency bands, access/backhaul integration, device-to-device communication, flexible duplex, flexible spectrum usage, multi-antenna transmission, ultra-lean design, and user/control separation.
» Read more

Hyperscale cloud – reimagining data centers from hardware to applications

by Ericsson

The hyperscale approach can help industries meet the IT capacity demands of the Networked Society. Transforming data centers in this way goes beyond hardware to impact the software layer, including hypervisors, operating systems, cloud platforms and – ultimately – applications.
However, challenges must be overcome if hyperscale is to be fully realized. As well as revealing the scope of this vision, this paper sets out the key considerations and questions for data center operators at every layer – from hardware to applications.
» Read more

Bluetooth mesh networking

by P. DiMarco, P. Skillermark, A. Larmo, and P. Arvidson

Bluetooth mesh, officially launched in July 2017, is a highly anticipated addition to the Internet of Things (IoT) connectivity space. Bluetooth is a widely used short-range technology found in smartphones, tablets and consumer electronics, and the Bluetooth Special Interest Group (SIG) has a strong reputation for delivering specifications and tools that guarantee global, multi-vendor interoperability.
The Bluetooth Mesh Profile standardizes a full stack connectivity solution for mesh networking, extending Bluetooth applicability for IoT use cases. Ericsson is a founding member of the Bluetooth SIG and has actively participated in the definition of the architecture and the development of the mesh profile specification.
This white paper provides an overview of the Bluetooth Mesh Profile and highlights some of its unique features. It also presents a large-scale building automation use case and illustrates the impact of configuration and deployment strategies on the mesh network.
» Read more

Mirai: New wave of IoT botnet attacks hits Germany

by Semantec Security Response

A new wave of attacks involving the Mirai botnet has crippled internet access for nearly a million home users in Germany. The latest attacks used a new version of the Mirai malware (Linux.Mirai) which is configured to exploit a weakness found in routers widely used in Germany. New variant of malware used in attacks that knocked 900,000 home internet users offline. Read more in this posting by Semantec Security Response.
» Read more