WHAT DOES THE IDEAL 5G NETWORK LOOK LIKE?

| December 7, 2018

article image
5G holds the dual promise of unprecedented services and unparalleled user experience. 5G will not be just another G, because it will go beyond capacity as we know it and require networking, as we know it, to change. 4G’s main service was mobile broadband, hence the focus on the capacity and connectivity offered by the radio access network (RAN). The transport network provided MBH (mobile backhaul) as “dumb, nailed-up, capacity pipes”, which linked the RAN to the services and applications in the core of the network. In general, the architecture of choice for 4G MBH was a physical ring supporting logical hub-and-spoke connectivity.

Spotlight

Malaysia IoT Association

Founded in 2016, MyIoTA or Malaysia Internet-of-Things Association is a national-level association where members are from the growing IoT value chain in Malaysia & beyond. With the global trend of 50B* devices(things) connected by 2020, IoT will be an important catalyst in transforming the digital economy landscape.

OTHER ARTICLES

IoT Security Flaws Are Putting Your Business at Risk

Article | March 5, 2020

As industries invest in the next generation of technology, the internet of things is at the top of the list. Once a novelty best known in residential settings, IoT technology has become mainstream in business and industry. Some even predict that having a Google Home or Amazon Echo in the conference room will become the norm. Now, you will find connected devices in Amazon’s warehouse robotics system Kiva, Airbus’ Factory of the Future and the augmented reality used by Caterpillar in its Cat Connect system. The number of IoT devices in use by 2025 could reach 22 billion, according to an IoT Analytics report. They will transform manufacturing, warehouse and logistics, health care, agriculture, shipping, energy and aviation. IoT security can’t be done as an afterthought; it must be integrated into operations from Day One because connected devices and systems use cryptographic keys that transmit data. Cybercriminals can gain access through these keys, allowing them to infect devices and systems with malware, steal data or shut down systems. Sometimes, the vulnerability has gone undetected for months.

Read More

How Will the Emergence of 5G Affect Federated Learning?

Article | March 5, 2020

As development teams race to build out AI tools, it is becoming increasingly common to train algorithms on edge devices. Federated learning, a subset of distributed machine learning, is a relatively new approach that allows companies to improve their AI tools without explicitly accessing raw user data. Conceived by Google in 2017, federated learning is a decentralized learning model through which algorithms are trained on edge devices. In regard to Google’s “on-device machine learning” approach, the search giant pushed their predictive text algorithm to Android devices, aggregated the data and sent a summary of the new knowledge back to a central server. To protect the integrity of the user data, this data was either delivered via homomorphic encryption or differential privacy, which is the practice of adding noise to the data in order to obfuscate the results.

Read More

5 Things to Know About the IoT Platforms Market

Article | March 5, 2020

5 years ago, when we forecasted that the IoT platforms market would have a 5-year compound annual growth rate (CAGR) of 35%, we wondered if our growth projection was unrealistically high. 5 years later, it has become apparent that the forecast was actually too low. The IoT Platforms market between 2015 and 2020 grew to be $800 million larger than we forecasted back in early 2016, resulting in a staggering 48% CAGR. Comparing what we “knew” back in 2016 to what we know today provides some clues as to why the market exceeded expectations so much. 5 years ago, no one really knew what an IoT platform was, let alone how big the market would be, which business models would work, how architectures would evolve, and which companies/industries would adopt them. The only thing that was “known” was that the IoT platforms market was a billion dollar “blue ocean” opportunity ready to be captured by innovative companies.

Read More

IoT Security: Inherent Risks Require Robust Solutions

Article | March 5, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

Spotlight

Malaysia IoT Association

Founded in 2016, MyIoTA or Malaysia Internet-of-Things Association is a national-level association where members are from the growing IoT value chain in Malaysia & beyond. With the global trend of 50B* devices(things) connected by 2020, IoT will be an important catalyst in transforming the digital economy landscape.

Events