August 6, 2018

It never ceases to amaze me how fast the wireless communication sector has evolved. To keep up with the expectations of the consumer, in terms of faster speed and stronger connectivity, the pioneers in the industry have worked their fingers to the bone. And hence fueling the contest, as to who rules the markets.

LG and Ericsson have been one of the largest contributors to the 2G, 3G and 4G standards, and are determined to even dominate the 5G domain. Lately, the 2 companies had been in a patent licensing dispute which they finally decided to settle out of court. They’ve also renewed their global licensing agreement along fair, reasonable and non-discriminatory (FRAND) terms,...

May 3, 2018

NB-IoT, EC-GSM and LTE-M are the cornerstones of "Mobile IoT " and are in the process of deployment in existing mobile network architecture.

April 18, 2018

Tuesday, April 10, 2018: A federal jury in Eastern District of Texas awarded VirnetX Holding Corp. (VHC) with a $502.6 million verdict against Apple Inc. finding that Apple was infringing 4 secure communications patents – providing a new chapter to the now eight-year old battle between Zephyr Cove, Nevada based VirnetX and Cupertino-based Apple, Inc.

VirnetX first sued Apple back in 2010 (6:10-cv-00417), for which the jury awarded VirnetX $368 million in damages in November 2012 plus a 1 percent ongoing royalty on iPhones. The four patents-in-suit relate generally to creating Virtual Private Network (VPN) connections from a client to server by way of sending a domain name se...

April 11, 2018

In the present technological era, information plays a vital role and a critical asset which should be protected. Cryptography has always been the first choice for the security solution to protect the information. It is a technique for changing over plaintext into some code, known as ciphertext, which the third party can’t decrypt easily. The cryptographic information is secure, however, decryption of data at the destination end, the complete integrity of the data and availability of the data when needed are three vital aspects of cryptography. In the view of these three aspects a few methods, protocols and security standards should be followed to protect the information ove...

Please reload

Please reload

Topics