Category: Networking

Intelligent Asset Management: Riding the Wave of Predictive Maintenance

Intelligent Asset Management: Riding the Wave of Predictive Maintenance

Maintenance and Repair Operations (MRO) are among the most important activities of modern industrial organizations. They enable enterprises to operate smoothly and have a significant impact on productivity and bottom lines. An important part of MRO deals with the management and maintenance of physical assets like the machines and tools used in production operations. That is why enterprises invest heavily […]

Read more ›
Wi-Fi 6 – The Bare Facts

Wi-Fi 6 – The Bare Facts

The latest wireless standard, 802.11ax (more commonly known as Wi-Fi 6), is about to be ratified by the IEEE and offers the potential for significant improvements over any existing Wi-Fi deployment. So, everybody should rush out and upgrade their wireless infrastructure – right? As you’d probably expect, the answer isn’t as simple as that. Before we look at some of […]

Read more ›
Ericsson launches 5G RAN Slicing to spur 5G business growth

Ericsson launches 5G RAN Slicing to spur 5G business growth

Ericsson has launched a 5G network slicing solution for radio access networks (RAN) that will enable communications service providers to deliver customized 5G services with guaranteed performance. Now commercially available, Ericsson 5G RAN Slicing allocates radio resources at 1 millisecond scheduling and supports multi-dimensional service differentiation handling across slices. This strengthens end-to-end slicing capabilities for dynamic resource management and orchestration […]

Read more ›
Public Wi-Fi Security Best Practices

Public Wi-Fi Security Best Practices

The common experience of public Wi-Fi is usually frustrating and unreliable due to the cumbersome and repetitive authentication process. In theory, once a device is connected and authenticated to a public Wi-Fi network for the first time, the user will be reconnected to the same network again automatically. But this is not always the case. Frequently, reauthentication of the device […]

Read more ›