The dream of an Internet of things could turn into a nightmare for mobile operators, if sloppily written apps or chatty smartmeters were to overload their networks with signaling traffic. To avert such a scenario, a number of operators are backing a new set of network usage guidelines for device manufacturers and app developers.
China Unicom - News, Features, and Slideshows
Government-controlled media outlets in China yesterday speculated that the iPhone 6 will not be immediately sold there because Apple retaliated against carrier partners who leaked details of the new models before their Tuesday launch.
A 26-year-old in China is suing one of the country's state telecommunication firms for disrupting access to Google after the government started blocking the company's services in May.
China Mobile, the world's largest mobile carrier, has finally inked a deal with Apple to sell the iPhone, according to a report by the Wall Street Journal.
Apple's iPhone could be getting a step closer to being officially offered on China's largest mobile network, after the nation's government finally issued 4G licenses to operate LTE TDD networks in the country.
News of North Korea's Internet outage was widely covered in the media on Monday of this week, and while a number of questions remain about what happened and who was responsible, speculation has it that North Korea was hit by a DDoS attach."
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Ransomware explosion is the latest security wakeup call for CxOs
- Hear from International Tom Corn on the future of security virtualisation | 28th July 2016 Victoria
- New Destination Gigamon Security Resources IS HERE
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- Join ME Bank, Deutsche Bank and Proofpoint (USA) speakers for a discussion on banking trojans. Register now
- The Future is Encrypted. Manage It.
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- Caution: That SSL Blind Spot is Growing