Cloud RAN Architecture for 5G

October 26, 2018

Mobile broadband is approaching a point where cellular infrastructure –originally designed for mobile telephony– is a viable substitute for fixed broadband in many markets. At the same time, the mass adoption of smartphones and other connected devices is increasing the need for speed application coverage, lower latency and greater capacity in mobile broadband networks.

Spotlight

OGL Computer Services Group Limited

OGL Computer is the technology partner of over 1,200 businesses in the UK. We are accredited by the world’s leading IT giants – Microsoft, HP, WatchGuard, Kaspersky - to deliver best-in-class IT solutions, business software and cyber security.

OTHER WHITEPAPERS
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Compliance with Internal Revenue Service (IRS) Publication 1075

whitePaper | June 15, 2022

The United States Internal Revenue Service’s (IRS) goal is to promote taxpayer confidence in the integrity of the tax system by ensuring confidentiality of the tax information provided to the federal, state and local agencies. The IRS 1075 publication provides guidance to agencies, agents, contractors and subcontractors on implementing adequate policies, processes, controls and safeguards to protect Federal tax information (FTI).

Read More
news image

Virtualization Management with SUSE Manager

whitePaper | November 10, 2019

Virtualization is the means by which IT administrators create virtual resources, such as hardware platforms, storage devices, network resources and more. There are quite a few tools that enable the creation of virtual resources (such as Xen and KVM), but what about the management of those tools? That’s where SUSE Manager comes in. The current iteration of SUSE Manager enables an admin to work with VMs via the following feature set.

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | August 15, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face

Read More
news image

Fault-Tolerant Components on AWS

whitePaper | November 10, 2019

This whitepaper provides an introduction to building fault-tolerant software systems using Amazon Web Services (AWS). You will learn about the diverse array of AWS services at your disposal including compute, storage, networking, and database solutions. By leveraging these solutions, you can set up an infrastructure that refreshes automatically, helping you to avoid degradations and points of failures.

Read More
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | March 28, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More

Spotlight

OGL Computer Services Group Limited

OGL Computer is the technology partner of over 1,200 businesses in the UK. We are accredited by the world’s leading IT giants – Microsoft, HP, WatchGuard, Kaspersky - to deliver best-in-class IT solutions, business software and cyber security.

Events