By Alison Barlow – A digitally inclusive city is one where all individuals, including the most disadvantaged, have access to online resources, as well as the skills to use them meaningfully.
MUST READ ARTICLES
By Matt Tooley – A computer science example of security through obscurity would be hiding or hardcoding a user’s passwords inside the binary code for an application. The idea here assumes the application is secure because the attacker won’t read or reverse engineer the password-containing code.
By Rolando Barja – The migration of habitants to urban areas has become one of the main problems in the development of today’s cities. With the great combination of people and various technologies, we use creativity to make these “new cities” more sustainable and efficient.
By Matt Carothers – In the world of cybersecurity, what would happen if the CEO ordered the security team to reduce the number of attacks it detected?
By Steve Goeringer – Why do we even need to worry about broadband security? There are a lot of very good answers to that question. We could say because it’s the right thing to do.
By Douglas Guthrie – With a growing universe of IoT applications and solutions, it can be challenging to determine what product or solution is right.
By Ron Hranac – Skin effect in metallic conductors is an important part of the coaxial cable portions of our networks. Skin effect ensures our radio frequency (RF) signals stay inside of the cables and other components — assuming the shielding is intact, of course. Skin effect is also a major factor in coaxial cable attenuation and is a key reason why attenuation increases as the frequency increases.
By John Williams — Through necessity we learned to become more efficient when it comes to squeezing capacity out of the existing spectrum. We have been able to consistently increase our service offering to meet the insatiable demand of the customer by leveraging technology.
By Jeff Finkelstein – While our customers, companies, employees, us, and our networks are stressed from the effect of isolation, there are learnings we can take away even in these times. I’ll give you my list of top three learnings.
By Mark Dzuban – I want to take this opportunity to say how proud I am of our industry: Of the teams that have managed network operations in this difficult environment. Of the tens of millions of dollars of advertising time dedicated to messages of prevention, support and healing.
By H. Mark Bowers – It’s now obvious that impedance and power in this circuit must also be complex (vectors) and indeed they are. Using the formula for Z (shown earlier) for a parallel circuit yields 70.7 ohms for this RC circuit but doesn’t provide the phase angle.
By David Ririe – We have spent the last several years aggressively upgrading our network capacity with DOCSIS 3.1 and more recently deploying remote PHY nodes in our new distributed access architecture (DAA). Our CTO Kevin Hart summed it up very well in a recent interview with the NCTA*
By Patrick Hunter – The PMA sublayer essentially combines the messages from the above PCS service interface and provides full duplex communications at 800 mega-symbols (Msymbols) per second over the copper twisted pair cabling.