Telecom and Networking

Computer technologies for 2012

ARM processor becomes more and more popular during year 2012. Power and Integration—ARM Making More Inroads into More Designs. It’s about power—low power; almost no power. A huge and burgeoning market is opening for devices that are handheld and mobile, have rich graphics, deliver 32-bit multicore compute power, include Wi-Fi, web and often 4G connectivity,

tcpdump

Packet capture is one of the most fundamental and powerful ways to do network analysis. If you think that tcpdump has been made obsolete by GUI tools like Wireshark, think again. Wireshark is a great application; it’s just not the right tool for the job in every situation. tcpdump uses a “one-off-command” approach that lends

WANem network emulator

There are many cases when need to emulate various networking conditions and scenarios. Usually the most practical way to test the application on different networking conditions is to use some kind of WAN emulator that lets you control the various networking characteristics. WANem is a free WAN emulator suitable for this task. WANem allows the

Security trends for 2012

Here is my collection of security trends for 2012 from different sources: Windows XP will be the biggest security threat in 2012 according to Sean Sullivan, security advisor at F-Secure: “People seem to be adding new systems without necessarily abandoning their old XP machines, which is great news for online criminals, as XP continues to

Telecom trends for 2012

What can we expect for the fast-moving telecommunications market this year? There are many predictions. I started looking for information from Twelve 2012 Predictions For The Telecom Industry and Top 12 Hot Design Technologies for 2012 articles. Then I did some more research on what is happening on the field and decided to make my

Hot trends for 2012

Generally, at the end of the year, predictions stream forth as to how this or that new technology will transform the world in the next 12 months. This article is a link collection to articles that try to do that. 2012 and the Technology Blahs article mentions few predictions: We will continue to see innovation

Ethernet for Vehicles

Ethernet for Vehicles Advances article tells that Ethernet technology in the car (a concept that was once unthinkable for the automotive industry) has been gaining momentum lately. The irony of this sudden trend is that a few years ago, Ethernet wasn’t seen as a solution to any applications in the car (one exception for this

SCADA systems security issues

SCADA systems are used to monitor and control critical installations in oil and gas refineries, water and power distribution plants, manufacturing plants and other industrial facilities. There has been a lot of discussion about malware and security in industrial automation systems after Stuxnet. Widely viewed as the most complex piece of computer malware ever created,

How Much Does The Internet Weigh

How heavy is the internet? Information on the internet such as e-mails, documents, video clips, Web pages, are represented in binary digits, 1s and 0s. How Much Does The Internet Weigh video gives you some idea of the wight of the information on the Internet.

Surveillance system to monitor mobile phones

Met police using surveillance system to monitor mobile phones article from theguardian magazine article tells that civil liberties group raises concerns over The Metropolitan police purchase of technology to track public handsets over a targeted area. Britain’s largest police force is operating covert surveillance technology that can masquerade as a mobile phone network. This allow