Fixed Mobile Convergence in the Transition to 5G
By Glenn Laxdal, Ericsson
|
2017 |
Device Risks to Network Operators from IoT
By Brian A. Scriber, CableLabs
|
2017 |
Principles for Interoperability in the Internet of Things
By J. Clarke Stevens, Shaw Communications
|
2017 |
Navigating IoT Technologies, Standards and Frameworks for Managed IoT Service
By Gary Gutknecht, Technicolor
|
2018 |
Software-Defined Service Orchestration for MABR TV Services
By Prabhu Navali & Raj Nair, Ericsson Media Solutions
|
2018 |
Changing the World: IoT Chaos as a Ladder to Improving Security
By Brian A. Scriber, CableLabs
|
2019 |
Dynamically Addressing the Gap of Software Application Protection without Hardware Security
By Rafie Shamsaasef & Aaron Anderson, CommScope
|
2019 |
New Sensing Techniques For Advanced IoT Applications
By Arun Ravisankar, Comcast Corporation
|
2019 |
Security Analysis Of 5G Mobile Networks
By Tao Wan, CableLabs; Mansour Ganji, Rogers Communications
|
2019 |
The Evolution Of Cellular IoT
By Hani Beshara, Ericsson Inc.
|
2019 |
IoT & Cognitive Computing Approach to Managing Equipment
By Tom Woginrich, International Business Machines (IBM)
|
2020 |
A Flexible and Scalable Architecture for Over-the-Air Credentials Provisioning
By Alexander Medvinsky, Dr. Tat Chan, Dr. Xin Qiu & Jason Pasion, CommScope
|
2020 |
Aggregate Wi-Fi Telemtery Use Cases
By Colleen Szymanik, Comcast
|
2020 |
Credential Fraud Detection and Remediation in Media Consumption Services
By Steven Epstein, Synamedia
|
2020 |
Developing Installation Guidelines for Wi-Fi Managed Devices
By Albert Garcia, Comcast
|
2020 |
DNS Encryption: Exposure or Opportunity?
By Mark Dokter & Bruce Van Nice, Akamai
|
2020 |
Session Overhead Reduction in Adaptive Streaming
By Alexander Giladi, Comcast
|
2020 |
Truth/Devil is in the Details: The Fusion of Design and Telemetry Information in Access Networks
By Matt Wichman, Venk Mutalik, Joann Shumard, Kathy Fox; Comcast
|
2022 |
Are Your Critical Facilities Ready To Be Managed With Big Data?
By Dustin Boyette, EnerSys
|
2022 |
Bitcode Obfuscation - Protecting Software Without Source Code Access
By Rafie Shamsaasef, Lex Aaron Anderson; CommScope
|
2022 |