|
2013: Telecom & Politics Collide Two thousand thirteen was arguably one of the most politically charged years in recent memory for the telecommunications industry. Accusations were hurled across oceans between the largest nations in the world, hearings were gaveled into order and the digital equivalent of news ink was spilled by the bathtubful detailing the ferocious intersection of telecom and government.... More Info |
|
| More Info Download Contact Author Share |
|
The Opportunities and Challenges Presented to Mobile Network Operators by Voice Over LTE (VoLTE) Mobile network operators (MNOs) across the globe are planning more than 300 LTE network rollouts by the end of next year. As a direct consequence of these new LTE networks, which are capable of delivering mobile broadband and communication services at greater capacity, lower latency and the lowest cost per transported bit than current mobile networks, mobile data traffic is predicted to grow to 11.2 exabytes per month by 2017, a 13-fold increase from 2012.... More Info |
|
| More Info Download Contact Author Share |
|
COMET News: December 2013 The biggest news story of the past month came not from a factory, boardroom or government, but from Mother Nature. Early in November, Typhoon Haiyan hit Southeast Asia with extremely high winds—nearly 200 miles per hour—becoming the strongest storm ever recorded at landfall.... More Info |
|
| More Info Download Contact Author Share |
|
Letter from the Editor If there’s one benefit to writing about fashion rather than technology (besides, that is, the glamorous parties, the beautiful people, the exotic locations, and generally being cooler in nearly every conceivable way), it’s that trends are easily identifiable and manifest themselves in a way that’s tangible and seemingly instantaneous.... More Info |
|
| More Info Download Contact Author Share |
|
Protecting the Four Pillars: Physical, Data, Process, and Architecture At the end of October, Adobe Systems announced that data belonging to 38 million of its customers had been obtained by hackers, who’d infiltrated the company’s systems at least two months earlier, along with the source code for three of its products. The server that housed Adobe’s database also housed a PR Newswire database of customer logins and passwords, which hackers stole and leveraged for various additional exploits, such as uploading fraudulent press releases.... More Info |
|
| More Info Download Contact Author Share |
Add Your Assets to the Research Center
Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.
UPLOAD CONTENTWelcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.
To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.