The US Department of Commerce recently amended its foreign-produced direct product rule (FPDP) and Entity List to include HiSilicon, Huawei’s semiconductor design subsidiary. This action has been widely deemed an escalation of the US government's "war on Huawei. In the broader context of the US sanction on Chinese tech firms, the addendum applies a consistency of "national security and foreign policy purpose” to HiSilicon.
The evolution of 5G infrastructure will not be homogenous. Operators will be deploying islands of 5G across a sea of 4G and 3G. They will be faced with the challenges of developing, deploying and managing services across hybrid infrastructures that will be comprised of a fragmented mix of the old and the new. In order to accelerate returns on 5G investments operators will need a common, integrated toolchain that allows service providers to scale operations and services across a mixed portfolio of technologies and operating environments.
As the IoT and 5G have evolved the models have moved from a simple Sensor to Gateway, to Cloud, to Edge, to near Edge, to Mobile Edge hype and perhaps one to two more terms that are circulating out there in the hype cycle. The terminology is confusing and typically is market speak or used to hype a specific technology and location between the Cloud and endpoint device that will be used for the majority of the collection, compute, response, and storage of the data.
neXt Curve attended the IoT Solutions World Congress 2018 in Barcelona to uncover what is hot and what is the real state of the Internet of Things, Blockchain and A.I. 2018 was the year of test beds, experimentation and pilots. We were curious to see what industries learned as they applied a rapidly-growing field of IoT technologies in discovering the use cases that matter.
neXt Curve principal, Akshay Sharma, attended 5G Americas held in Dallas, Texas. 5G Americas is an industry trade organization headquarters in Bellevue, Washington, composed of leading telecommunications service providers and manufacturers with a mission to advocate for the advancement of LTE wireless technologies and their evolution to 5G. Attendees included the leadership of mobile carriers in the Americas, executives from the network equipment vendors, and leading analysts from the global analyst community.
The original telco central offices of the past had legacy mainframe-like telephone switches with legacy voice features, which was ideal in the 1980’s and 1990’s but are archaic today. With VoIP over LTE in the cloud, these local offices can be re-architected into 5G nano-datacenters that provide very low latency fixed and mobile access and distributed edge computing that will enable new and innovative hyperconverged IT/CT applications and services that avail new business models and network monetization opportunities for operators.
neXt Curve attended the North American version of Mobile World Congress held in Los Angeles, California. This year, CTIA partnered with GSMA in hosting an event focused on the coming-together of the media and telecommunications industries into an important megatrend that promises to make MWCA (now Mobile World Congress Los Angeles) a special event among the Mobile World Congresses held around the world.
While eSIM's have been used in the Samsung Gear 2 3G, Google Pixel 2, iPad Pro (Apple SIM) and the Series 3 Apple Watch, the iPhone has the potential to accelerate the broader eSIM adoption among carriers across the globe laying the foundation for the next big thing in Internet of Things (IoT) endpoint privacy and security.
WWDC 2018 was held yesterday, and the Apple team announced a wide range of new features across the portfolio of Apple platforms: Apple TV, iOS, MacOS and WatchOS as they always do each year. It's always a bit of a challenge to determine which of these features, if any, is going to change the game. After all, it is Apple. We expect innovation, and the bar is set very high for this icon of "disruption."
Mobile carriers with Managed Security Service Providers have the opportunity to address and solve some of the challenging cybersecurity issues threatening consumers and businesses alike, such as hardware-level vulnerabilities, encryption hacks, and inter-application data breaches, that are increasing the risk to privacy protection in the world of GDPR.