Spotlight

Cyber attackers are relentless, whether casting a wide net or narrowly targeting your organization. They use multiple methods to compromise your information and infrastructure resources, worming their way into your data and networks wherever they can, with off-the-shelf malware, brute-force password attacks, or phishing and other forms of social engineering.


OTHER LIVE WEBINARS

SCTE LiveLearning for Professionals Webinar Series: Prepping Cable's Networks for 10G

July 21, 2022 | 11:00 AM ET

Facing the prospect of competition from 5G-enabled broadband services, the cable industry is ardently pursuing an ambitious 10G (as in 10 Gbps) initiative to develop its multi-gigabit broadband prowess over a mix of HFC, fiber and wireless networks. But, even with the release of CableLabs' new DOCSIS 4.0 spec last year, it's not clear that the industry is ready to make that next great leap to symmetrical 10 Gbps service.
Register Now

SCTE LiveLearning for Professionals Webinar Series: Lowering Latency Levels

November 17, 2022 | 11:00 AM ET

With work-from-home collaboration tools emerging as critical during the pandemic and consumers increasingly using bandwidth-eating applications like video conferencing and multi-player online gaming, cable operators and vendors are looking to lower network latency levels to improve the quality-of-experience (QoE) for subscribers. As a result, cable technologists are now working hard on ways to do just that.
Register Now

Working With 5G and Wi-Fi 6

May 19, 2022 | 11:00 AM ET

Now that both 5G and Wi-Fi 6 are rolling out across the planet, cable operators have promising opportunities to use these two next-gen wireless technologies to broaden their reach and expand their service offerings. But both new wireless technologies present new technical, operational and competitive obstacles for operators and vendors accustomed to working in a wireline environment.In this session, we will delve into those opportunities and obstacles and see how operators and vendors are working to incorporate 5G and Wi-Fi 6 into the cable HFC architecture and turn the two wireless platforms into the industry's latest gold mine.
Register Now

SCTE LiveLearning for Professionals Webinar Series: Edge Computing: The Next Frontier

September 15, 2022 | 11:00 AM ET

Few things are hotter in today's tech world than edge computing, as companies of all shapes, sizes and stripes seek to bring powerful Internet functionality as close as possible to users at the tip of their service networks. Accordingly, cable operators and tech vendors are now exploring edge compute's potential as they aim to develop and deliver next-gen, low-latency connectivity services such as augmented reality/virtual reality (AR/VR), cloud gaming, holographic video, light-field displays, smart homes, 5G mobile, autonomous vehicles, healthcare sensors, surveillance and facial recognition.
Register Now

Spotlight

Cyber attackers are relentless, whether casting a wide net or narrowly targeting your organization. They use multiple methods to compromise your information and infrastructure resources, worming their way into your data and networks wherever they can, with off-the-shelf malware, brute-force password attacks, or phishing and other forms of social engineering.

resources