TELECOM NEWS

CURATED BY THE INTELLEX COMMUNICATIONS CONSULTANTS

Hyperconvergence ready for the mainstream

Hyper-convergence (hyperconvergence) is a type of infrastructure system with a software-centric architecture that tightly integrates compute, storage, networking and virtualization resources and other technologies from scratch in a commodity hardware box supported by...

CIO Explainer: What Is Blockchain?

What you need to know to speak intelligently on Blockchains and their growing importance, particularly in financial enterprises Known by many as the technology underpinning the bitcoin digital currency, blockchain has acquired a new identity in the enterprise. At a...

Cell Phone Inventor looks to next big thing

Marty Cooper, who built the first handheld cell phone, says his invention has a glaring flaw: You have to keep charging its battery. "Keeping your phone charger around is a real annoyance," Cooper told CNNMoney in an interview. "And I think it's going to be an...

The Internet of Things is altering business processes

The Internet of Things market (IoT) is starting to have an impact in businesses across the US, but not necessarily in the ways many have predicted. A recently-completed survey of 620 professionals involved with IoT within their respective organizations, conducted by...

Sony Files Patent for Contact Lens Camera

Sony has filed a patent for a contact lens that will allow users to record and play back video images. The proposed design would build on both contact lens and smartphone technology, and will be controlled by the user blinking. The US patent application reads as...

Coming to terms with ISIS cyber-attacks

While the threat from ISIS-inspired cyber-attacks is a high concern, especially in light of the formation of a new United Cyber Caliphate composed of previously disparate pro-ISIS hacking collectives, these hacking groups still operate unofficially, remain poorly...

Why it’s easy for hackers to take over ATMs

Almost any ATM in the world can be illegally accessed and jackpotted with or without the help of malware. According to research conducted by Kaspersky Lab experts, the widespread use of outdated and insecure software, mistakes in network configuration and a lack of...