Showing posts with label mobile technology. Show all posts
Showing posts with label mobile technology. Show all posts

Tuesday, August 25, 2015

5 Tips to Secure Your Wireless Router





Wi-Fi routers can give you enough headaches without worrying if someone is leeching off your connection. You pay for that bandwidth you receive every month, and with so many movies to stream, games to play, and work to remotely connect to, you don't want to share your Internet pipe.

Not only can having others access your router slow down your connection, but there is the possibility they might get you into some legal entanglements. An incident made news least year in which a man was falsely arrested in child pornography charges. The guilty party was actually a neighboring bandwidth parasite neighbor using the innocent man's connection to download the odious content.

While a false arrest is an extreme case, having unauthorized users can cause performance issues and pose a security risk. Here are a few ways to keep leeches off your router.

    Password encryption should be well-known to anyone with a wireless router. Never leave your router open without a password, and there are very few reasons for the average home and small business user to not encrypt wireless signal with WPA2 security.

    Turn off broadcasting is a feature available in just about all routers. For example, you name your network "Jane's Wi-Fi." You know what the wireless name is (also called SSID), so you can easily enter the SSID into any devices you want to access that network. Other people, however, do not need to know the SSID. To prevent outsiders from seeing your network's name turn off broadcasting in your router's settings. This capability is typically found within the wireless router settings page in the router's management software. In the below image the "Enable SSID Broadcast" option would be unchecked, so that your network's name does not show up in other people's wireless network scans.

Disable Guest networks because lots of router now ship with an extra wireless network configured for guests to access your router. A guest network lets guests share your Internet connection without giving them access to shared files and devices on your private network. Guest networking is often used by businesses to provide customers courtesy access, but I recommend home users turn it off. Guest network passwords are sometimes configured with no security, or default passwords that anyone can easily look up on Google if they know the kind of router you have. If you are friend enough that I give you permission to share my router, you are friend enough to know my passphrase key.

MAC Filtering is a feature also found in most routers. You add the MAC address (a unique identifier for that unit) of any device you want to give access to the router into the filtering list. Any device not on the list that tries to get on will be blocked from accessing.

Get a network monitoring app such as Fing which will scan your network and provide information that you can use to see if you have any unwanted users or devices on your network. Fing will perform a discovery on your network and report information such as hostnames, IP addresses, MAC addresses, and more. If there is any information you don't recognize, you can investigate and found out if someone or something is on your network that shouldn't be.

Visit Us : @ Hyperjet

Tuesday, July 28, 2015

Sri Lanka to be the first country to have universal internet access with Google Loon




Sri Lanka’s government and Google on Tuesday signed an agreement to cover the Island with 3G internet under ‘Google Loon project’.

Sri Lanka is the first country in the world to have Internet access covering the whole country with the government support, Google Vice President and Project Leader on GoogleX Project Loon, Mike Cassidy said.

Project Loon is the latest moonshot from Google[x]: balloon-powered Internet access.

It is a network of balloons traveling on the edge of space, designed to connect people in rural and remote areas, help fill in coverage gaps and bring people back online after disasters.

“With our system we use LTE which is a common protocol most of the telcos use around the world. So anyone with a smart phone would be able to get internet access. One of the key things we do is we partner with the local telcos. In New Zealand we partnered with Vodafone.” Cassidy said.

It is expected to place 13 balloons above Sri Lanka over the next few months (One balloon is expected to last over 100 days) and internet service providers will have to connect this network through these ‘floating towers’ which will ultimately reduce their transmission costs.

“Matara covered or Jaffna covered is now history. In a few months we will be able to say Sri Lanka covered,” addressing the signing ceremony Foreign, Telecommunications and IT Minister Mangala Samaraweera said.

“As a result of this agreement, the entire Sri Lankan island – every village from Dondra to Point Pedro – will be covered with affordable high speed internet using Google Loon’s balloon technology.” Samaraweera said.

The project is handled by ICTA with the collaboration of former Facebook executive Chamath Palihapitiya who now represents lotus flare, a leading mobile content provider.



Visit Us : @ Hyperjet

Monday, March 23, 2015

A Fully Transparent Solar Cell that Could Make Every Window and Screen a Power Source





Researchers at Michigan State University have created a fully transparent solar concentrator, which could turn any window or sheet of glass (like your smartphone’s screen) into a photovoltaic solar cell. Unlike other “transparent” solar cells that we’ve reported on in the past, this one really is transparent, as you can see in the photos throughout this story. According to Richard Lunt, who led the research, the team are confident that the transparent solar panels can be efficiently deployed in a wide range of settings, from “tall buildings with lots of windows or any kind of mobile device that demands high aesthetic quality like a phone or e-reader.”

Scientifically, a transparent solar panel is something of an oxymoron. Solar cells, specifically the photovoltaic kind, make energy by absorbing photons (sunlight) and converting them into electrons (electricity). If a material is transparent, however, by definition it means that all of the light passes through the medium to strike the back of your eye. This is why previous transparent solar cells have actually only been partially transparent — and, to add insult to injury, they usually they cast a colorful shadow too.

To get around this limitation, the Michigan State researchers use a slightly different technique for gathering sunlight. Instead of trying to create a transparent photovoltaic cell (which is nigh impossible), they use a transparent luminescent solar concentrator (TLSC). The TLSC consists of organic salts that absorb specific non-visible wavelengths of ultraviolet and infrared light, which they then luminesce (glow) as another wavelength of infrared light (also non-visible). This emitted infrared light is guided to the edge of plastic, where thin strips of conventional photovoltaic solar cell convert it into electricity. [Research paper: DOI: 10.1002/adom.201400103 - "Near-Infrared Harvesting Transparent Luminescent Solar Concentrators"]

If you look closely, you can see a couple of black strips along the edges of plastic block. Otherwise, though, the active organic material — and thus the bulk of the solar panel — is highly transparent. (Read: Solar singlet fission bends the laws of physics to boost solar power efficiency by 30%.)

Michigan’s TLSC currently has an efficiency of around 1%, but they think 5% should be possible. Non-transparent luminescent concentrators (which bathe the room in colorful light) max out at around 7%. On their own these aren’t huge figures, but on a larger scale — every window in a house or office block — the numbers quickly add up. Likewise, while we’re probably not talking about a technology that can keep your smartphone or tablet running indefinitely, replacing your device’s display with a TLSC could net you a few more minutes or hours of usage on a single battery charge.

The researchers are confident that the technology can be scaled all the way from large industrial and commercial applications, down to consumer devices, while remaining “affordable.” So far, one of the larger barriers to large-scale adoption of solar power is the intrusive and ugly nature of solar panels — obviously, if we can produce large amounts of solar power from sheets of glass and plastic that look like normal sheets of glass and plastic, then that would be big.

Source : [www.extremetech.com]                                      Visit Us : @ Hyperjet

Thursday, March 12, 2015

Microsoft HoloLlens Brings Holography Into Physical World !!

Microsoft HoloLlens brings holography into physical world. Now its possible to create what you think. Its easy to convert your imagination into designs. Easier to explore the places.


















Visit Us : @ Hyperjet

Thursday, November 13, 2014

Navdy's transparent Head-Up Display (HUD)





A modern heads-up display (HUD) projects a great deal of what was traditionally shown on a car’s instrument panel onto the windscreen, and is becoming must-have equipment for high-end modern cars. However, as many of us don’t drive high-end expensive cars, we don’t get to take advantage of this technology. That’s where Navdy comes in. Currently in prototype form, the device promises to bring a projection display with voice and gesture controls to any car.

The Navdy prototype HUD integrates with your smartphone and your car’s instruments (accessed via the vehicle’s OBD II port) to emulate the functionality of a high-end projection display, whilst adding voice and gesture controls. To achieve this, the creators claim that the device can be paired with an iPhone (iOS 7+) or Android (4.3+) to allow any function that your phone has – such as maps, messages, and music streaming – to be accessed (or even read aloud) by Navdy.

A built-in infrared camera provides touchless gesture control so that drivers can answer a call by swiping left or dismiss it by swiping right, while the voice recognition capabilities of Siri or Google voice, depending on your phone, can also be used to initiate phone calls or to dictate texts or social media comments.
Navigation capabilities, complete with alerts and turn-by-turn directions are also provided, with the added bonus that the on-screen navigation doesn't vanish when a call comes in. Instead the navigation continues whilst the conversation takes place, allowing you to talk to someone without getting lost.



The Navdy team says their device will also display information, such as speed, RPM, distance-to-empty, fuel economy, tire-pressure warning or battery-voltage warning, all from the car’s computer, provided that your car is built after 1996 and has an OBD II port – and you plug it into it.

Boasting a dual core processor running Android 4.4, a 5.1 in (12.9 cm) wide display, an accelerometer, e-compass, ambient light sensor, Wi-Fi (802.11 b/g/n), Bluetooth 4.0/LE, along with audio out via Bluetooth or 3.5 mm jack, a mini-USB port, and an Internal speaker and microphone, the Navdy certainly appears to be prepped with all the features to meet its claimed capabilities.

Of course, there are other aftermarket HUD devices out there – the Garmin HUD being one notable example – and many smartphone apps allow speed and navigation details to be projected onto the windscreen. But the Navdy aims to produce a unit that is more integrated into a vehicle by accessing a cars on-board computer and by providing a single hub to access all smartphone-connected features without all of the messy compromises generally required for in-car add-on equipment.

Slated for shipping in early 2015, Navdy is now available to pre-order at a discounted price of US$299 for the next 30 days, before reverting to its regular price of US$499.



Visit Us : @ Hyperjet



Monday, November 10, 2014

Wi-Fi Security for Public Networks





Introduction
 
Wi-Fi hotspots present a unique set of security problems, quite different from the security issues involved in home and office networks. These hotspots have unknown computers accessing them. And in this case, the very nature of a public hotspot demands that it broadcasts its SSID. A public hotspot also has to do away with encryption and MAC address filtering to enable hassle free access to all users. 

Even if a public hotspot used encryption and user verification, it is not possible to tell which customer accesses the network with a malicious intent.
Under these circumstances, the precautions have to come from the users who access a WiFi public hotspot. Here are a few things you can do to protect yourself while using a public hotspot. 

1. Use legitimate access points

This is an often overlooked, nevertheless important safety step. Malicious access points that connect to hijackers’ databases have started coming up everywhere. These have the same SSID as a legitimate access point. The malicious ones can collect such information as your usernames, passwords and even credit card data of people who sign up for new services. 

Steer clear of anything that doesn’t look as coming from a legitimate provider. Also check the list of all legitimate SSIDs in any given area. Avoid setting the wireless card in your gadgets to automatically connect with any available network. Turn off peer-to-peer mode when you are in a public place to avoid others connecting directly to you, and last but not the least, keep your WiFi card in the off position when you don’t use it! 

2. Encrypt your sensitive files
 
Emails, usernames and passwords and virtually anything you beam from your device to the access point can be intercepted by someone close by. A lot of this information is going as clear text and not in a converted format, making it possible for the interceptor to access your information. Therefore encrypt any sensitive information you send via email from a public hotspot. There are numerous file encryption programs, freeware and shareware to help you with this.

3. Use a VPN
 
A VPN or virtual private network creates a tunnel between your device and the hotspot, thus preventing anyone in between from intercepting your data. This has become a standard requirement for companies to allow remote employees to connect to their networks. If your company does not provide you with a corporate VPN, you can go for a commercial one like JiWire SpotLock. 

4. Set up a personal firewall
 
Connecting to a public wireless network implies that you are joining a local network of unknown computers. These are on the same IP subnet, so it is easier for them to capture the traffic between your computer and the hotspot. Therefore always install a personal firewall program to protect your personal laptop. In the case of a corporate device, consult the IT manager before installing any firewall. 

5. Install and regularly update your anti-virus software
 
Public networks are places where your machine is the most vulnerable to attacks from viruses and other malicious code. It is more important here to have effective antivirus software in your system. Also take care to visit the vendor’s website and download the latest update, or avail the auto-update features. 

6. Update your OS
 
Most large utility and business software vendors like Microsoft and Apple frequently develop additional security patches for their operating system and programs. In the case of Microsoft Windows, you can visit the Windows Update site to get the new patches. In the case of Mac OS, enable the automatic Software Update feature in System Preferences.
Also be wary of the attachments that come with emails, as most of the recent viruses and worms have spread through them. 

7. Ensure privacy
 
Take care while you are typing information like name and password while you are at a public hotspot. There are people around you. 

8. Use Web-based email instead of Outlook
 
Avoid sending emails through Outlook, Eudora or Apple Mail when you’re using a public hotspot. Always use web-based email that uses secure http. 

9. Disable file sharing

You may be using file sharing while you are using your home or office network. Make sure that this feature is turned off before you access a public hotspot, for obvious reasons. 

10. Protect your confidential files with strong passwords
 
Use a strong password for access to your computer and a separate password to protect sensitive files. It would be a good idea to back up this with your most important data stored in an encrypted keychain storage device. 


Visit Us : @ Hyperjet

Thursday, October 16, 2014

Google Unveils Android Lollipop






On Oct. 15, a 10-foot-tall statue of a lollipop joined sculptures of an ice cream sandwich, a chocolate doughnut, and other confections on Google’s (GOOG) campus in Mountain View, Calif. This was how news came of the latest major update to Android, the operating system that runs on 85 percent of the world’s smartphones: not with a hyped press conference or long lines outside gadget stores, but with the installation of an oversize lawn ornament. 

Lollipop is the 13th major version of Android. But it’s the first to be fully developed under Sundar Pichai, the Google senior vice president and confidant of Chief Executive Officer Larry Page who took over the OS operation last year. Along with Lollipop, Pichai introduced three Google-designed devices, including the supersize Nexus 6 smartphone, manufactured by Motorola with a gigantic 6-inch screen, half an inch bigger than the one on the iPhone 6 Plus. Pichai hopes the phone will be the first of a series of new Lollipop-powered computers in living rooms, cars, and just about everywhere else. “We aren’t only trying to ship two [products],” he says, obliquely referring to rival Apple’s (AAPL) well-received pair of new iPhones. “We are trying to enable thousands.”

Lollipop has arrived at an unusually important moment in Google’s attempt to control the next generation of computing devices. Samsung (005930:KS), Google’s largest partner, warned on Oct. 6 that it expects to miss its quarterly sales targets because of price cuts on its phones. In Europe, regulators are examining whether Google violates antitrust law by forcing manufacturers that use Android to preinstall its apps, which Google denies. Meanwhile, Apple has gotten rave reviews for iOS 8 as well as for its hot-selling iPhone 6 and 6 Plus. On Oct. 16, Apple will convene the media to ooh and aah over new iPads. With the new version of Android, Google “has to overcome concerns that there is not parity between Android’s ecosystem and iOS,” says James McQuivey, an analyst at Forrester Research.


Lollipop is Google’s answer to the ominous rumblings in Android land. It’s a svelte OS, capable of running on 512 megabytes of memory, which means that even the cheap phones spreading through China and India can pack in Android’s latest features. (Older versions used considerably more memory.) Lollipop’s look, called “material design,” uses moving icons and shifting font sizes in an effort to more clearly organize information onscreen. It also attempts for the first time to standardize and connect the interfaces of a user’s various Android devices, including a new set-top box that plays Web video on a TV.

Motorola’s Nexus 6 smartphone has a sleek, curved aluminum back and a crisp screen. The company says it can run for hours after charging for just 15 minutes. The phone will go on sale (subsidized) at all major U.S. carriers by the end of the year, when an unlocked version will sell online (fully priced) for $649. Pichai studiously avoids using the word “phablet” but says the Nexus 6 screen was a response to consumer demand. Large-screen phones now make up 25 percent of Android devices, up from 1 percent three years ago, according to researcher Strategy Analytics. It’s unclear whether customers who now have a supersize option from Apple will still flock to an Android version.



Visit Us : @ Hyperjet


Tuesday, October 14, 2014

VoIP : Voice Over Internet Protocol Technology


                             

VoIP or voice over internet Protocol is that technology which makes it possible to make phone calls through the internet. This technology is given many common names as internet phone service or digital phone service or broadband phone service.

Traditional landlines use the Public Switched telephone network, which involves high company fees to that is why they are expensive. However while making VoIP calls no such fees is involved because the calls are made through a broadband connection which routes the calls over the World Wide Web. This is the primary reason that such calls are very cheap.

There could be misconceptions that through VoIP you can make calls only on internet phones, this is not the case you can make calls on any phone service using internet phones. This makes it very flexible and a very economic option.

Two types of internet phone services that are very popular these days are software VoIp and hardware VoIp. Both of these programs use the internet to make phone calls but the hardware program uses a small adapter kind of device to process calls, whereas the software VoIp program uses the computer and special software for the calling process.

Although both of these services are economical solutions as compared to landlines but both are suited to serve specific needs. Ahead are explained both the techniques and their suitability for various circumstances.

Software Based Program-

This program works through your computer so utilize this you need to have a Pc and sound card, speakers and a microphone at all times. So, this type of service is best for occasional use or while traveling. To get the best results from this service it is recommended that you use headset with microphone. Or you could make use of USB or Internet phones that are special kinds of phone designed for this purpose.

Once the internet connection is established then you need to use the special software based VoIp program for making and receiving calls. Although, this service can be used on a dial up connection too, but it is better to have a broadband connection. Another benefit that can be availed in this service is that majority of the VoIp software based programs allow you to download their programs for free and set up a free account.

Mostly people use this service for making long distance international calls as they can be made at very cheap rates. The incoming on these lines is free and you are charged only when you make calls outside. There are many programs to choose form, Net2phone, Webphone etc.

Hardware Based Program –

This service is more user friendly as the requirement of computer is not there, normal phone instruments can be used to make these calls. This service is more economical for home and work places and is being widely used as a substitute for the traditional landlines. When referring to Internet phone service or Digital Phone Service then people are referring to the Hardware based VoIp program.

Whichever company you take your subscription from will provide you a small device that is an adaptor which on the one end connects to the internet and on the other connects to the phone. This adapter routes and connects all calls to and from the internet.

There are a variety of programs to chose from ranging form the limited period plans for 200- 500 minutes for local and long distance to unlimited plans which cost from $18- $30 which users find more economical. There is a variety of service providers in the hardware VoIp programs like Vonage, Packet8, AT&T Callvantage etc.


Visit Us : @ Hyperjet

Wednesday, September 10, 2014

What is Cloud Hosting?



In recent years Cloud Hosting is in demand due to many features it offers. Features of Cloud Hosting include low cost of ownership, cost effectiveness, fast provisioning and easy backups of data.
These many companies are offering Cloud Hosting services which include many features such as Pay on hourly or fixed cost basis, easy addition/removal of resources in your hosting account. It supports almost all the operating systems and softwares. You can install windows, Centos, Redhat Linux, Windows XP etc... on your account. The technical team of Cloud Hosting companies will provide you round the clock technical support.

What is Cloud Hosting?

The Cloud Hosting is a type of web hosting where your server (Virutal server) is provisioned and runs on the Cloud Computing environment. In this type of hosting you can scale-up and scale-down your server instantly. It provides all the features of a dedicated server plus the feature of scaling-up and scaling-down easily. For example you have started with a small website and when your customer base increases; you can easily add more computing resources to your server to handle more users.
Here you don't have to buy or rent a complete dedicated server, you just have to rent the required resources from the cloud computing environment. You can scale your server at any time.

Here the benefits of Cloud Hosting:
  • Fast provisioning
  • Almost all the operating systems are supported
  • Easy scaling up of the server resources
  • Easy scaling down of the server resources
  • Pay only for what you use
  • In case of hardware failure, your Hosting environment will continue to run as it is the responsibility of Cloud computing to use another server without any downtime.
  • The cloud computing technology is highly scalable
Disadvantages of Cloud Hosting:

The Security is the major concern in the Cloud Hosting environment. You will never know the physical location of your data in Cloud Computing environment.

Future of Cloud Hosting:

The future of Cloud Hosting is bright. People are using Cloud Hosting to host their websites and web applications. The Cloud Hosting is cheaper and can be provisioned quickly.


Visit Us : @ Hyperjet

Thursday, September 4, 2014

How Vehicle Tracking Works?

Vehicle Security is a primary concern for all vehicle owners. Owners as well as researchers are always on the look out for new and improved security systems for their vehicles. One has to be thankful for the upcoming technologies, like GPS systems, which enables the owner to closely monitor and track his vehicle in real-time and also check the history of vehicle's movements. 

This new technology, popularly called vehicle Tracking Systems has done wonders in maintaining the security of the vehicle.
Vehicle Tracking System is one of the biggest technological advancements to track the activities of the vehicle. The security system uses Global Positioning System GPS, to find the location of the monitored or tracked vehicle and then uses satellite or radio systems to send to send the coordinates and the location data to the monitoring center. At monitoring center various softwares are used to plot the Vehicle on a map. In this way the Vehicle owners are able to track their vehicle on a real-time basis. Due to real-time tracking facility, vehicle tracking systems are becoming increasingly popular among owners of expensive vehicles.


What is Vehicle Tracking? Vehicle Tracking System

The vehicle tracking hardware is fitted on to the vehicle. It is fitted in such a manner that it is not visible to anyone who is outside the vehicle. Thus it operates as a covert unit which continuously sends the location data to the monitoring unit.

When the vehicle is stolen, the location data sent by tracking unit can be used to find the location and coordinates can be sent to police for further action. Some Vehicle tracking System can even detect unauthorized movements of the vehicle and then alert the owner. This gives an edge over other pieces of technology for the same purpose.

Monitoring center Software helps the vehicle owner with a view of the location at which the vehicle stands. Browsing is easy and the owners can make use of any browser  and connect to the monitoring center software, to find and track his vehicle. This in turn saves a lot of effort to find the vehicle's position by replacing the manual call to the driver.

As we have seen the vehicle tracking system is an exciting piece of technology for vehicle security. It enables the owner to virtually keep an eye on his vehicle any time and from anywhere in the world.

Visit Us : @ Hyperjet


Thursday, August 7, 2014

Data Security When Charging Mobile Devices


A lot of people have a smart phone which they use for work.  The vast majority of these people will have access to their work emails on said phone.  And some of these emails will have sensitive corporate information on them.  Just think of that big deal that you’re on the cusp of winning which has to be kept very hush hush.  Imagine if you gave that information to a hacker….
This is a problem which most people don’t even realize exists.  As long as you don’t lose your smart phone or tablet, surely the information is safe?  Unfortunately it isn’t.  The term “juice-jacking” has been coined in recent years and it means the hacking of a mobile device while it is being charged.


Juice-jacking (the stealing of data when a device is being charged)


There are several ways in which data can be taken unbeknownst to the user.  More often than not it will happen when there is an interaction between the users’ mobile device and another system.  There are various ways in which this can happen.  One such example of this is through the routine backup to the cloud which a fair amount of mobile devices do automatically.  Most people will also charge their mobile devices through their laptop/desktop which creates a local system interaction.  Another example of interaction is through tethering where one mobile device will provide network access to another.  If the company who has issued the mobile devices is able to control all of these factors, the risk is usually fairly small.

However, more often than not, at least one of these components will be external.  For example, if you charge your work mobile on your personal laptop, charging your personal phone on your work laptop, setting up an automatic backup without the company’s consent and regular monitoring or even just trying to charge your device through an untrusted charger.  Not only does any of the above allow company data to be stored in unsecure locations outside of the company but it can also facilitate the spread of malware between devices.  Ideally what the company would want to do is to ensure that security controls on the works mobile device restrict it from syncing with other devices.  This will prevent it from accidentally syncing with a personal computer.  Likewise, it is also possible to restrict what devices can sync with work computers.  To prevent remote, cloud backup, the company is able to either to block those services or simply by setting up the mobile devices in the first place so that they don’t use them.

If you’re travelling and are stuck in an airport with nowhere to charge your mobile device, think twice before accepting that friendly guys offer to let you charge it in their laptop.  Malware programs can take less than a minute to run and who knows what information they’re siphoning off your mobile device in the mean time!  So keep your device safe so juice-jacking doesn’t happen to you.  Malware and viruses can also come from other sources that said.  Most people have probably heard of Heartbleed and how many passwords were stolen.  Although that was to do with the programming, you probably thought you could trust most of those sites to protect your data.  How can you be absolutely sure that the website you love with those amusing cat GIFs on it hasn’t slipped a virus onto your laptop?  And how do you know this wasn’t then transferred to your work mobile when you were using your laptop to charge it?

Essentially the main problems come from individuals plugging in their work or personal mobile devices to the wrong things.  This is why many companies ban using computers (at home or at work) to charge mobile devices to prevent juice-jacking from occuring.  However, this then creates the problem of plug sockets.  There are never enough plug sockets to plug everything into at once.  So what to do!?  Well thankfully, there are solutions to this lack of plug sockets. 

Visit Us : @ Hyperjet

Wednesday, June 4, 2014

Telecom Industry Trends in the Next Decade



For 20 years, continuous technical transformation and information waves have driven high growth in the telecom industry. However, an age with saturated telecom penetration is coming, and telecoms industry is facing a brand new situation. Looking to the next decade, how can the telecoms industry adapt itself to the requirements of the new age in the changed environment? Through "Four Surpasses", the telecoms industry will continue to achieve high growth in the next decade.

Surpassing population and developing new subscribers: The Internet of Things opens a door to new opportunities

The rapid development of mobile communication and the Internet facilitates the approaching of a "global village". In some developed countries and regions, mobile communication penetration rate has already reached or surpassed 100%. In the coming two years, the number of mobile subscribers will be up to 5 billion, and the network will cover over 80% of the global population.
However, it is far from enough to achieve the connection of "human beings" and utilize the intelligence of "human beings". Today, we are faced with many common problems. For example, energy shortages coexist with massive wastes of energy. According to research from United States Department of Energy, electrical energy loss accounts for 67% of the total electrical energy produced. Science and technology improves our lives, yet on the other side it results in serious environmental pollution. Statistics from the Asian Development Bank shows 20% of the global population lacks access to safe drinking water, 50% of the population does not have adequate health care...
The Internet of Things emerges under this background. The essence of the Internet of Things is to apply information and communication technology (ICT) to different industries, thus realizing "Intelligent Perception and Intelligent Control" via the adoption of ICT and achieving the objective of "efficiency improvement, scientific decision making, energy saving and environmental protection, and cost savings" to promote the upgrade and development of human society from an electronic society (E society) to a ubiquitous society (U society).
The Internet of Things describes an unprecedented blueprint for industries such as telecom and IT. It is predicted that by 2020, the ratio between machine type communications to human type communications will reach 30:1, which will allow operators to extend their subscriber base from 6 billion people to 50 billion or even over a trillion machines and objects, and thus opens a new door and serves as the basis for "surpass population and developing new subscribers" for the telecoms industry.

Surpassing voice communications and developing new services: Mobile broadband contributes to the industry's rapid development

The revenue for voice services has saturated or even gradually declined with the developments of mobile communication in the past decade. In the past five years, the revenue for fixed voice services was reduced by 15%, and the growth rate of mobile voice services decreased from 17.5% in 2004 to 1% in 2009 in Spain. Even in emerging markets represented by India, the revenue per minute (RPM) of mobile operators in 2008 fell 50% compared with the same period in 2007.
At the same time, mobile broadband is entering a golden age of development, bringing human society to a new height of ubiquity. The number of mobile broadband subscribers will increase tenfold, reaching 3 billion in the next 5 years. However, we still have not fully utilized mobile broadband, which depends on the joint efforts of the entire industry chain, including "terminal, network, and service". Although new network technologies such as HSPA/LTE are capable of supporting the cost effectiveness of mobile broadband development, there are many challenges ahead in facing the thousandfold traffic increase of mobile broadband for the next decade. New types of smart terminals such as iPhone bring convenient man-machine interactions, yet the high price of smart terminals is the biggest bottleneck that restricts the popularity of mobile broadband. WOA technology, represented by "Widget", can move Internet services and industry services to mobile phones, greatly enriching the services and applications for mobile broadband.
Currently, an open ecological environment that includes "terminal, network, and service" which centered on broadband experience is in an early form. With the challenges of traffic and cost being overcome, it is predictable that mobile broadband will become the most significant force to promote industry development. Operators can achieve sustainable growth if they focus on developing mobile broadband services rather than voice communications.

Surpassing the pipeline, and exploring new business model: Cloud computing brings new opportunities

The popularity of broadband provides a basis for cloud computing. Cloud computing appears in the form of an "information power plant", and is overturning the traditional business mode of software, hardware, and media. That is, users are moving from "buying products" to "buying services".
The change in the business mode is redefining the industry structure. By changing the distribution mode of software to "terminal (iPod/iPhone) + application (iTunes/Appstore)", Apple has surpassed Wal-Mart and become the largest music distribution channel; Google is incubating a larger revolution to achieve development, deployment, and operation of software and services through its APP engine, with flexible expansion based on traffic through the cloud computing platform and cloud storage platform at the bottom layer. In this case, there is no need for software vendors and users to buy any hardware equipment or platform software. This technology will overturn the sales modes of hardware and software for companies such as IBM, HP, Microsoft, and Oracle.
The development of cloud computing also brings opportunities for operators. On the one hand, cloud computing has shown the significance of networks and thus promotes network development. On the other hand, cloud computing services rely on "secure and reliable" service providers, and "secure and reliable" are exactly advantages of operators. Conversely, we always see Internet service providers, no matter large or small, shut down Internet services or even go bankrupt. If operators enter the cloud computing market, they can form new services and experiences based on secure and reliable mass computing storage by integrating industry contents and applications in the digital supermarket mode, provide customers with new values, and give full play to operators' networks and subscriber advantages. In addition, by utilizing reliable and enormous user assets obtained through customer locations and user experience, operators can employ new business models and cultivate new revenue streams through building data mining and advertisement platforms.
The market for cloud computing will move into a rapid development phase, with the market size exceeding 200 billion USD in the next five years. Cloud computing will be the key for business development for operators, to realize "extending network value by surpassing the pipeline".

Surpassing telecom and extending to other industries: The revolutionary experience of home networking creates new markets

It is well known that the new experience of "digital music" and music modes like MP3 overturned the CD and music distribution industry; that is, the revolution of the user experience overturned an industry. With the increase in broadband penetration, what kind of revolution of user experience will home networking bring? Which industries will be overturned?
Let's look at the composition of home networking. The first is an audiovisual entertainment network dominated by a "TV screen". The second is a communication network dominated by PCs and mobile phones. The third is a sensor network. The fourth is a video surveillance network. The fifth is a home network. The sixth is an interconnection and control network. Among the six components, the TV screen is the first to experience revolutionary change. "On-line and On-demand" will bring consumers a brand new service experience. Consumers can freely select contents, releasing themselves from a rigid schedule. The brand new service experience will overturn the video industry dominated by "broadcast and DVD".
Microsoft CEO Steve Ballmer said in June 2009 that traditional media would disappear within 10 years, being replaced by Internet-based content. EU pointed out in "Internet of 2020" that by then, TV channels are distributed as other Internet services, and do not need terrestrial or satellite broadcasting anymore, except in isolated areas. If the past decade witnessed the convergence of telecom and the Internet, the next decade will witness the convergence of broadcast, TV, and the Internet.
Home networking is the major battlefield for "network convergence of telecoms, TV and the Internet". The "bi-direction and high bandwidth" features of the telecom network have an advantage in network convergence, and provide unprecedented strategic opportunities for operators to "surpass telecom, and enter into new industries".
Looking forward to the next decade, "four surpasses" will help operators break the ceiling of "population, voice, pipeline, and industry", and bring the telecom industry to a new height. However, it takes a long, hard time to achieve "four surpasses", especially faced by the hundredfold increase in network traffic brought by mass terminals and mass digital contents.
The traffic of mobile networks will increase a thousandfold, bringing unprecedented challenges to bandwidth and cost. Huawei will innovate products, services, architectures, and technologies as always, develop a future-oriented single network strategy to support growth of future services, and promote sustainable development for the entire industry.


Visit Us : @ Hyperjet

Popular Posts

Recent Posts

Text Widget