Known as the “Mother of the Internet,” Radia Perlman is an engineer and mathematician who invented the important algorithm behind Spanning Tree Protocol (STP), along with other algorithms that still define the internet’s basic traffic rules.
Thomas Edison was not the only inventor whose innovations made it easier for the world to communicate. Granville Woods, also known as “Black Edison,” was an African American inventor who helped develop the telephone, the streetcar, and the telegraph. Of the 15 inventions and 60 patents he held in his lifetime, his most important invention was the multiplex telegraph, also known as the induction telegraph, or block system.
Hedy Lamarr was an Austrian-American film star during Hollywood’s “Golden Age.” But many people are not aware that she was also a scientist and inventor. Lamarr co-invented an early technique for spread spectrum communications that was designed to combat Nazi jamming signals that could redirect torpedoes. Her patented frequency-hopping signal led to the development of GPS, Bluetooth, and Wi-Fi.
Your business success quite literally depends on a lifeline of reliable, cost-effective and secure communications for everything from voice to data to video.
When big business falls prey to cybercrime, we see a frightening picture of how costly and invasive a security breach can be. Behind the high-profile headlines and big-name corporations, the reality is even grimmer. In truth, the impact of cyberattacks on small to medium-sized businesses (SMBs) is more damaging and more prevalent. The Verizon 2018 Data Breach Investigations Report indicates 58% of malware attacks target small businesses. SMBs are prime targets for hackers because they have more digital assets than an individual consumer, making a successful hack more profitable. At the same time, they tend to have fewer security protocols and protections in place than larger corporations.After an Attack – the Price to Pay
A growing proliferation of telecom providers are competing to establish a foothold in the Unified Communications as a Service (UCaaS) space by filling the need for cost-effective, self-manageable solutions. Many companies simply pack and ship out IP phones, then walk you through software downloads and configurations using an inexpensive, one-size-fits-all model that leaves an enterprise struggling to effectively manage and maintain secure, reliable communications. Plug-and-pray is often the business model that UCaaS providers adopt.
How to Stay Smart in the Coming Era of IoT 5GSprinkled across the 5G landscape, the Internet of Things (IoT) introduces a jumble of acronyms that have left us all in a collective mental haze. As with every new technology, we must do a bit of work to make quick sense of the changes if we want to keep up. So, get familiar with some of the names for new technologies and they will start to make more sense.
When it comes to wireless technology of the future, it’s all about faster, better, cheaper. As the speed of change drives more and more demand for bandwidth and businesses strive to keep up, the need for the 5G Network intensifies. Observers may debate the merits, but technology keeps driving the market forward, oblivious to the fears and hesitations of some more entrenched business environments—and the average person.
Recent large-scale mergers and acquisitions are so numerous and dramatic that 2017 could well be called “The Year of the