Telecommunications company, Huawei, showcases its LTE network in a shipping container
Huawei - News, Features, and Slideshows
Huawei in pictures
Huawei has developed a prototype smartphone battery that can be recharged to half its capacity in just five minutes.
With their own dedicated processor and operating system, LTE/3G modems built into new business laptops and tablets could be a valuable target for hackers by providing a stealthy way to maintain persistent access to an infected device.
Xiaomi regained its position as China's leading smartphone vendor in the second quarter, while Apple fell to third place despite increased sales of its iPhones.
China's largest chip foundry is entering into a joint venture with Qualcomm to develop chips, at a time when the country is looking for technology to emerge as a semiconductor producing powerhouse.
In 2014, Huawei generated CNY 288,197 million (US$46.5 billion), a year-over-year (YoY) growth of 20.6%. Of that, Huawei invested over 14% of its revenue back into research and development.
- See Your Traffic for What It Really Is
- Test Your Knowledge of Network Encryption
- Caution: That SSL Blind Spot is Growing
- Start your cloud journey. Register now and learn a wide range of AWS cloud solutions covered in the monthly AWS Webinar Series.
- Join special guest Jeff Lanza, Retired FBI Agent (USA), Ty Miller, Mark Gregory & Andy Solterbeck for a discussion on ransomware security
- Ransomware explosion is the latest security wakeup call for CxOs
- As networks evolve, visibility remains key to managing IT-security risk in business terms
- The Future is Encrypted. Manage It.
- New Destination Gigamon Security Resources IS HERE
- Next-generation SIEM turns low-level security monitoring for high-level business goals
- AISA 2016 | Hear from Bruce Schneier, David Lacey, Rik Ferguson and many more | 18-20th October Register Today
- CLOUDSEC2016 - Timothy Wallach, Cyber Taskforce FBI (USA) speaks on the status & evolution of global cybercrime. Save your seat
- Join Skeeve Stevens, Stanley Shanapinda, and more on how to manage metadata to maximise your ability to detect and prevent an attack. Register