5G Mobile World Congress 2016

Innovations in 5G Core

With the forthcoming 5G network, service providers have set the ambitious goal of delivering a highly reliable, secure and resilient network that will provide communication services to a wide variety of industries — anywhere, at any time, over any access technology and on any device.  New 5G Core network capabilities will be a key element in fulfilling this goal. Although basic network slicing is supported in 4G, in addition to network slicing enhancements, the 5G Core introduces a more robust and flexible authentication framework, a new QoS and Policy framework and adds new data exposure capabilities that will be leveraged ...
Read More

oneM2M’s Value Proposition for IoT Application Developers

The Internet of Things (IoT) holds the promise of billions of connected devices and trillions of dollars in economic opportunity. However, to capitalize on the huge commercial upside, IoT application developers face many pain-points created by the increasing complexity and diversity of IoT deployments. Think about a smart building, smart city or smart factory. These environments house many different types of devices, technologies and vendors. In such situations, the immense scope of the IoT allows for mixing-and-matching across different types of IoT technologies, ranging from different forms of network connectivity to multiple semantic ontologies. The burden of dealing with a ...
Read More

Putting the oneM2M Standard into Action: ATIS OS-IoT Software

Machine-to-machine (M2M) services are now present in almost every area of social and economic activity. From personal fitness to city-wide environmental monitoring, data is being collected, processed and summarized to support smart services. With this explosion comes important challenges such as ensuring the reliability, maintainability, scaling and security of these innovations. To provide a platform to address these areas, the oneM2M global partnership has developed a technical standard defining a common M2M Service Layer that can be readily embedded within various hardware and software, and relied upon to connect the myriad of devices in the field with M2M application servers ...
Read More

Joining Forces to Make the FCC’s Robocalling Initiative a Reality

The Federal Communications Commission (FCC) has acted to resolve one of the biggest scourges of modern times: malicious robocalling and caller ID spoofing. A formal recommendation on unwanted call blocking made in September 2017 builds on the output of the industry-wide Robocall Strike Force, consisting of telecom services providers, technology experts and consumer groups, to continue work on eliminating this nuisance. At September’s inaugural Mobile World Congress Americas, FCC Chairman Ajit Pai reiterated that stopping bogus calling is the number one consumer priority of the FCC, and that a group of stakeholders should come together and bring their individual expertise ...
Read More

Why Time May Not Be on Your Side

The ATIS Synchronization Committee (SYNC) is at the forefront of the industry in doing work to examine GPS vulnerability and methods of GPS backup for time and frequency synchronization.   The group has recently published a technical report which discusses this in detail, GPS Vulnerability (ATIS-0900005). GPS (Global Positioning System) has become so ubiquitous in everyday life that most people take it for granted, although it is used in cars, planes, computers, smartphones, and wearables, to name a few common examples. While GPS is associated primarily with navigation, location tracking and mapping, it is also critical to providing precise time, time ...
Read More