APPLICATION INFRASTRUCTURE

Ken Hu from Huawei: 5G creates new value for industries and new opportunities for growth

prnewswire | November 12, 2020

Ken Hu from Huawei: 5G creates new value for industries and new opportunities for growth
At the 11th Annual Mobile Broadband Forum today, Huawei's Deputy Chairman Ken Hu spoke with leaders in the telecoms and digital technology sectors about the new value that 5G can bring to different industries around the globe. As 5G is poised to transform the way we live, connect, and work, the telecoms sector is deeply invested in creating more value beyond the consumer market. Global 5G rollout is progressing quickly. As a leader in this domain, China has already seen over 600,000 base stations deployed in more than 300 cities, supporting more than 160 million 5G connections across the country. 5G services in China now deliver speeds in the hundreds of Mbps, and a wide array of 5G services have already been implemented in more than 20 domestic industries, including healthcare, ports, steel, power grids, mining, and manufacturing.

Spotlight

The growth of cloud computing and the emergence of big data systems have been two of most disruptive technology trends over the last few years. This deployment has changed the way technology organization operate and deliver values to their stakeholders.

Related News

Reeling from Ransomware Attack, eHealth Saskatchewan Says Restructuring IT Infrastructure

eHealth Saskatchewan | June 12, 2020

Five months after a ransomware attack locked the computer systems storing eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure. It wasn’t long after the agency’s IT team discovered files from some of its servers had been sent to suspicious IP addresses. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software. Five months after a ransomware attack locked the computer systems storing confidential medical data of Saskatchewan residents, eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure, and that it’s still unsure who stole the data or where it is. The health agency’s chief executive officer Jim Hornell confirmed in February that the virus first entered the eHealth system on December 20, 2019. Employees didn’t discover there was a problem until they tried to open files on Jan. 6 and were asked to hand over bitcoin in exchange for the encrypted data. As we outlined publicly in early February, eHealth discovered some files were sent to IP addresses outside of eHealth’s environment. Those files were encrypted and password protected by the attacker. This makes it difficult to determine the exact content of those files,” wrote Ian Hanna, director of communications for eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. Read more: COMPARING SIX LEADING CONVERGED INFRASTRUCTURE VENDORS' PRODUCT eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. ~ Ian Hanna, director communications eHealth Saskatchewan Law enforcement and privacy officials have been kept up-to-date on the forensic investigation, wrote Hanna. He also confirmed that eHealth had hired outside help to determine if any files were illegally sold. As of now, no trace of such activity has been found. The agency’s website says, should it be determined that personal health information has left the organization, the public will be advised. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software the introduction of multi-factor authentication for crucial systems, added Hanna. There was a total lack of visibility of the health agency’s computer network, according to David Masson, director of enterprise security at Darktrace. Unfortunately, it’s a common problem with many companies, he said. It’s too late to really do much once you discover there’s a problem because by then, the damage is done, One of the other disturbing details of the attack against eHealth Saskatchewan. With eHealth, there was never any ransom paid, but we’ve seen that the data has left [the data centre] and turned up in various other places,” said Masson. When it comes to action items on the part of residents whose data might be compromised, Masson suggested additional vigilance. Be wary of strange emails, text messages and phone calls. And it doesn’t hurt to check bank statements every once in a while, he added. One of the other disturbing details of the attack against eHealth Saskatchewan is how files from some of its servers had been sent to suspicious IP addresses, he indicated. This could reflect a more sophisticated ransomware attack akin to the one that crushed an agricultural services company earlier in June. In that case, a website called “Happy Blog” run by threat group dubbed REvil auctioned off data it says was stolen from a London, Ont., company that offers crop advisory and protection services. The auction notice said the data available included accounting documents and customer accounts for the last three months. Read more: HELIX TECHNOLOGIES BREAKS GROUND IN DATA ANALYTICS FOR CANNABIS PRODUCTION, UNVEILS BI TOOL

Read More

North America, Europe and China Lead Vehicle-to-Everything Adoption as OEMs Partner with Mobile Network Operators

prnewswire | October 15, 2020

Frost & Sullivan's recent analysis, Strategic Analysis of the Global Vehicle-to-Everything (V2X) Market, Forecast to 2025, finds that V2X sales across the globe are projected to rise. In North America, sales are estimated to reach US$1.12 billion by 2025, while Europe and China are forecasted to reach US$3.29 billion and US$6.27 billion, respectively. Most regions prefer cellular vehicle-to-everything (C-V2X) over dedicated short-range communication (DSRC) because the technology will see a commercial launch in 2021 with cellular LTE-based network access as 5G is not yet fully implemented. Gurumurthy added: "V2X adoption in North America is largely driven by original equipment manufacturers (OEMs), mobile network operators (MNOs), and the 5G Automotive Association (5GAA).

Read More

IBM Leverages Artificial Intelligence to Automate IT Infrastructure

IBM | May 08, 2020

IBM recently launched new capabilities and services powered by artificial intelligence to help chief information officers (CIOs) help their businesses recover and restart in the wake of the COVID-19 pandemic. IBM’s Think Digital conference intends to help CIOs automate their IT infrastructures to become more resilient to disruptions and reduce costs. “What we've learned from companies all over the world is that there are three major factors that will determine the success of AI in business – language, automation and trust,” said Rob Thomas, senior vice president, cloud and data platform at IBM.

Read More

Spotlight

The growth of cloud computing and the emergence of big data systems have been two of most disruptive technology trends over the last few years. This deployment has changed the way technology organization operate and deliver values to their stakeholders.