Our Latest Posts

Mission Critical Matching Communications


Publié par Frederic - 5 February 2016

In 2014, the European Commission published a study it has ordered from the British SCF Associates titled: “Is Commercial Cellular Suitable for Mission Critical Broadband? ”. This issue has been on the top lists of concerns for many countries (among which we find France and the USA) for a few years now, and all of…

Top 8 hackable Internet of Things


Publié par Frederic - 29 January 2016

Christmas and New-year’s holidays are always a good occasion to give and receive trendy and modern gifts. Maybe this year, you have received a useful smart object, or a useless one from this list (http://www.internetofuselessthings.io), that have made you happy? But your happiness might be ruined by what follows… Experts agree that all smart objects…

Hollywood Hacking


Publié par Frederic - 6 January 2016

For a long time now the American film industry displays scenes showing a computer operator, a jewelry thief, a spy or a genius inspector who, with a few computer tricks, break through complex systems in a very short time, to take over confidential data, steal secrets or goods, open doors or industrial command controllers, turn…

End-users security acceptability


Publié par Frederic - 12 November 2015

In October 2013, the British newspaper “The Guardian”, based on information disclosed by Edward Snowden, revealed that 35 world leaders’ phones were tapped by the NSA. In Jun 2015, “Médiapart” and “Libération” revealed that the NSA has eavesdropped the French presidents’ conversations on their mobile phones at least between 2006 and 2012: this comes as a…

What are the C-RAN challenges?


Publié par Frederic - 12 November 2015

Mobile operators heavily rely on low-energy, flexible traffic management and reliable architecture*. A Cloud-RAN (C-RAN) has the advantage of centralizing task-processing intelligence for multiple radio stations in one single node. This main node may then process cells interference which is the number one issue for operators and users in the quest for quality of service…

Telecoms stock values: danger ahead!


Publié par Frederic - 7 October 2015

An IHS Technology study forecasts a 23.3 billion dollars peak for 4G-LTE mobile equipment global investments in 2015. It will then decline on the beginning of 2016. These investments thus no longer offset the decrease in older generations’ 2G and 3G networks investments, because everyone awaits the 5G technology. In this context, how could Numericable-SFR’s…

Security breaches: a deadly hazard!


Publié par Frederic - 7 October 2015

Various security exploits have been reported by recent news: – In governmental areas: the US Office of Personal Management revealed on July 2015 that 21.5 million American official’s accounts, both inside and outside the government, were hacked, leaking sensitive personal data including their social security numbers and the content of their security clearance request file…

Ciphering is not the ultimate response….


Publié par Frederic - 7 September 2015

Cryptology and encryption are among trending topics these days, refreshing some knowledge about the subject might hence be useful, to be aware of the risks for instance, related to the encryption of your connected objects, brought by technical advances in the field of quantum computers and their computing power. Cryptography, the art of defensive ciphering…

Who will be the 5G-network’s outsider?


Publié par Frederic - 26 August 2015

Will Nokia’s acquisition of Alcatel give birth, by knock-on effect, to a new wireless networks actor? After this merger and acquisition, which major actors will remain in the wireless telecoms field? Chinese companies Huawei and ZTE, Ericsson and Nokia Corporation (Nokia + Alcatel)! It’s quite obvious that Huawei or ZTE are not necessarily welcome in…

A short movie is worth a lengthy speech…


Publié par Frederic - 4 August 2015

More and more often, examples of people who are victim of identity theft or their personal data being fraudulently used, as a result of unfortunate information publishing on media such as Facebook, LinkedIn, Viadeo, Twitter, etc. are presented in colloquia. We do not always consider experts’ recommendation, usually considering “it only happens to others”… A…