Using Mobile Networks to Coordinate Unmanned Aircraft Traffic

November 24, 2018

This growth is taking place despite severe limitations on commercial UA flights, notably the need for pilots to keep the aircraft in sight. At the same time, the wireless technologies used to control UA have a very limited range, restricting the usefulness of these aircraft. If pilots were able to operate unmanned aircraft beyond-visual-line-of-sight (BVLOS), UAS could be used for many new applications, such as inspection and surveys, transport and logistics, surveillance and monitoring, and communications and media. Safe BVLOS operations would also enable UAS to play a much greater role in disaster response and law enforcement.

Spotlight

Nagarro

Nagarro drives technology-led business breakthroughs for industry leaders and challengers. When our clients want to move fast and make things, they turn to us. Today, we are 6,000 experts across 21 countries. Together we form Nagarro, the global services division of Munich-based Allgeier SE.

OTHER WHITEPAPERS
news image

Infineon-Get ahead of Condition Monitoring and Predictive Maintenance with sensors Whitepaper

whitePaper | June 28, 2022

Almost everything needs maintenance to ensure that it functions correctly. Parts wear out and need to be replaced but waiting till something breaks to replace it can be very costly. Unscheduled downtime can mean lost productivity, inconvenience or expensive overtime rates. Just think how much you would have to pay a plumber to come out at 3am on Christmas day.

Read More
news image

Exploring the future of the network

whitePaper | January 6, 2023

The 5TONIC co-creation laboratory was launched in 2015 to provide an open environment where members from services, users and SMEs can collaborate with the telecom community on specific 5G mobile research and innovation projects. The aim is to support innovation and help organizations work together to develop and deliver market-ready 5G solutions, technology applications and business ventures. 5TONIC promotes joint project development, entrepreneurial ventures, discussion fora, events and conferences with focus on 5G mobile technology, supporting members along the technological cycle from research to practical business application.

Read More
news image

Medical and iot device security for healthcare

whitePaper | December 27, 2021

With the advent of the Internet of Things (IoT), businesses are experiencing a digital transformation bigger than the PC and Mobile revolutions combined and healthcare is no exception. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs but they also bring increased security risks.

Read More
news image

Growing 5G+Wi-Fi RF Complexity Demands Innovative, Advanced & Tightly Integrated RFFE Solutions

whitePaper | July 28, 2023

According to Counterpoint Research, the 5G+Wi-Fi 7 market will see cumulative shipments of over 7 billion devices through 2027 and grow at more than 100% annually between now and 2027 driven by leading applications including smartphones, gateways and routers, and the automotive sector.

Read More
news image

IXON Whitepaper Security 2022

whitePaper | April 25, 2022

IXON provides a fully integrated cloud-based Industrial IoT solution for machine builders, building automation integrators and system integrators. The IXON Cloud platform together with a connectivity gateway, the IXrouter or third party devices with the IXagent software installed, o¬ers an all-in-one solution for safely and easily setting up remote access to your machines, monitoring or logging machine status and receiving alerts about important machine events — all within your own branded IXON Cloud portal.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | August 16, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More

Spotlight

Nagarro

Nagarro drives technology-led business breakthroughs for industry leaders and challengers. When our clients want to move fast and make things, they turn to us. Today, we are 6,000 experts across 21 countries. Together we form Nagarro, the global services division of Munich-based Allgeier SE.

Events