0 comments on “CES 2019: Key Takeaways”

CES 2019: Key Takeaways

neXt Curve attended the largest consumer electronics trade show on the planet with over 180,000 in attendance to identify the deeper technology and market trends that are driving the rapid evolution of our digital lives and are expressed in the new digitally-enabled consumer applications from smart home, 3D sound to emotionally-aware robots.

0 comments on “Market Insight: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions”

Market Insight: The Marriott Hack: A Call to Action for Holistic Security and Due Diligence for Mergers and Acquisitions

On November 30th, 2018, Marriott disclosed its Starwood acquisition had a 4-year-old data breach that exposed data for up to 500 million customers.  However, this wasn’t the first time they have been hacked. Corporate boards need to take cybersecurity and the risks of a digital future seriously.

0 comments on “World Internet Conference 2018: Key Takeaways”

World Internet Conference 2018: Key Takeaways

neXt Curve attended the World Internet Conference 2018 in Wuzhen, China's premier conference on the digital economy and policy, which took place from the 6th to the 9th of November. This year's conference was sparsely attended by U.S. tech giants such as Apple and Google, but their absence didn't put a damper on the global scope of the event and its continued promotion of the Digital Silk Road.

0 comments on “IoT Solutions World Congress 2018: Key Takeaways”

IoT Solutions World Congress 2018: Key Takeaways

neXt Curve attended the IoT Solutions World Congress 2018 in Barcelona to uncover what is hot and what is the real state of the Internet of Things, Blockchain and A.I.  2018 was the year of test beds, experimentation and pilots.  We were curious to see what industries learned as they applied a rapidly-growing field of IoT technologies in discovering the use cases that matter.

2 comments on “Market Insight: Holistic Security is Key to Meet the Digital Security Threats of Today & Tomorrow”

Market Insight: Holistic Security is Key to Meet the Digital Security Threats of Today & Tomorrow

On October 4th, 2018, Bloomberg's Businessweek released a report alleging that Chinese spies implanted a "malicious chip" into server motherboards assembled by Super Micro Computer Inc. (Supermicro), a U.S.-based Original Device Manufacturer (ODM) that manufactures servers used in hyperscale data…

0 comments on “The Digital Gap: Boardroom Leadership & Governance”

The Digital Gap: Boardroom Leadership & Governance

Corporate boards of today are challenged with understanding the opportunities and the risks and threats presented by "Digital".  As cybersecurity incidents and privacy issues from the Sony hack to the Facebook/Cambridge Analytica debacle increase in number and severity, board rooms cannot afford to not know.  neXt Curve hosted a discussion with USC Marshall School of Business professor, Bob Zukis on the urgency for digital savvy and competency in the board room.

0 comments on “The Democratization of 5G Everything”

The Democratization of 5G Everything

The original telco central offices of the past had legacy mainframe-like telephone switches with legacy voice features, which was ideal in the 1980’s and 1990’s but are archaic today. With VoIP over LTE in the cloud, these local offices can be re-architected into 5G nano-datacenters that provide very low latency fixed and mobile access and distributed edge computing that will enable new and innovative hyperconverged IT/CT applications and services that avail new business models and network monetization opportunities for operators.

0 comments on “Mobile World Congress Americas 2018: Key Takeaways”

Mobile World Congress Americas 2018: Key Takeaways

neXt Curve attended the North American version of Mobile World Congress held in Los Angeles, California. This year, CTIA partnered with GSMA in hosting an event focused on the coming-together of the media and telecommunications industries into an important megatrend that promises to make MWCA (now Mobile World Congress Los Angeles) a special event among the Mobile World Congresses held around the world.

1 comment on “Market Insight: Apple Ushers in The Next Big Thing in Device Security & Privacy – eSIM”

Market Insight: Apple Ushers in The Next Big Thing in Device Security & Privacy – eSIM

While eSIM's have been used in the Samsung Gear 2 3G, Google Pixel 2, iPad Pro (Apple SIM) and the Series 3 Apple Watch, the iPhone has the potential to accelerate the broader eSIM adoption among carriers across the globe laying the foundation for the next big thing in Internet of Things (IoT) endpoint privacy and security.

7 comments on “Contextually-Aware Mobile Security as a Service: The Key to IoT Security and GDPR Compliance & Readiness with Blockchain”

Contextually-Aware Mobile Security as a Service: The Key to IoT Security and GDPR Compliance & Readiness with Blockchain

Mobile carriers with Managed Security Service Providers have the opportunity to address and solve some of the challenging cybersecurity issues threatening consumers and businesses alike, such as hardware-level vulnerabilities, encryption hacks, and inter-application data breaches, that are increasing the risk…