Applications that can’t be supported by LTE and its progeny probably can be supported by a small number of alternative technologies that have commercial applications. So sharing by contract should be the default mode.
t’s great to have a nation with China’s resources developing technology products that can be used all over the world. This keeps US firms such as Cisco and European firms like Ericsson on their toes. But at the end of the day, users of these products need to be allowed to choose on the basis of product quality rather than nation-of-origin leverage.
The Wehe data doesn’t tell us whether the observed behavior is consistent with company disclosures or general net neutrality conventions. While we don’t expect legal opinions from network performance scholars, it’s important to know more about the triggers of network management.
The Internet is not simply a sandbox for network research any more, it has become the primary means of electronic communication around the world. Before long, it will be the only such means and we will all be better for it. Please allow firms that depend on networking to invest efficiently so as to maximize their incentives to innovate.
So yes, 5G is over-hyped the same way that all breakthrough technologies are over-hyped. The market will ultimately shape it, and we will also find new applications that the marketing folks do not anticipate yet. So in that sense, 5G is also under-hyped, just as breakthrough technologies always are.
Before the broadband benchmark is adjusted again, the FCC really does need to lay out a methodology for coming up with the numbers. It appears than the 25/3 standard was driven by the desire of Netflix to stream 4K video everywhere.
Figures released by US Telecom on Tuesday showed reduced spending on broadband infrastructure for the second year in a row. While 2014 was the best year for broadband investment since the fiber bubble…
By now you’ve certainly heard about the KRACK Internet security nightmare afflicting Wi-Fi. The exploit, discovered by Mathy Vanhoef and Frank Piessens, leverages a vulnerability in the IEEE 802.11i standard for data…