Home Tags ARTICLE

Tag: ARTICLE

Chemical Plant Cyber-Kinetic
Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no...
5G Open RAN Security
I’m skeptical of ‘futurists’. Work closely enough with the development of technology solutions and you’ll know that the only certain thing about the future...
Securing Society 5.0

Introducing Society 5.0

Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books...
Securing Society 5.0 Introduction
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems...
5G Cloud Architecture
The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more...
Open RAN Security
It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic,...
5G Cybersecurity Safety
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind....
Smart Home Wireless Connectivity
In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment...
5G Opportunity and Cybersecurity
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in...
Quantum Computer 5G Security
Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would...
IIoT 5G Trust Security
When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the...
5G Connectivity Security
The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine,...
NFC Cybersecurity
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology...
RFID Cybersecurity
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it...
Wi-Fi Cybersecurity
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.)....