Tech Innovator

‘Open Security’ Is More Important Than Ever

By Matt Tooley – A computer science example of security through obscurity would be hiding or hardcoding a user’s passwords inside the binary code for an application. The idea here assumes the application is secure because the attacker won’t read or reverse engineer the password-containing code.

Read More

Smart Cities — Better Cities For Everyone

By Rolando Barja – The migration of habitants to urban areas has become one of the main problems in the development of today’s cities. With the great combination of people and various technologies, we use creativity to make these “new cities” more sustainable and efficient.

Read More

Reliability: On the Path to 10G

By Alberto Campos — Historically in cable, network reliability did not require much attention. Early on, when our industry focus was video delivery, we promoted the amount and diversity of content, and ensured that technology kept up with the increasing video resolutions.

Read More

Enabling 10G Networks Using Flexible MAC Architecture

By Colin Howlett — As with most technologies, DOCSIS has gone through bundling and unbundling phases over the last decade in the bundling of separate edge-QAM modulator and DOCSIS CMTS in an integrated centralized CCAP, then unbundling again with remote PHY using CCAP cores and distributed remote PHY devices (RPDs).

Read More