SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Research Center

Recently Added Media
Article
2013: Telecom & Politics Collide

Two thousand thirteen was arguably one of the most politically charged years in recent memory for the telecommunications industry. Accusations were hurled across oceans between the largest nations in the world, hearings were gaveled into order and the digital equivalent of news ink was spilled by the bathtubful detailing the ferocious intersection of telecom and government.... More Info


More Info Download Contact Author Share

Article
The Opportunities and Challenges Presented to Mobile Network Operators by Voice Over LTE (VoLTE)

Mobile network operators (MNOs) across the globe are planning more than 300 LTE network rollouts by the end of next year. As a direct consequence of these new LTE networks, which are capable of delivering mobile broadband and communication services at greater capacity, lower latency and the lowest cost per transported bit than current mobile networks, mobile data traffic is predicted to grow to 11.2 exabytes per month by 2017, a 13-fold increase from 2012.... More Info


More Info Download Contact Author Share

Article
COMET News: December 2013

The biggest news story of the past month came not from a factory, boardroom or government, but from Mother Nature. Early in November, Typhoon Haiyan hit Southeast Asia with extremely high winds—nearly 200 miles per hour—becoming the strongest storm ever recorded at landfall.... More Info


More Info Download Contact Author Share

Article
Letter from the Editor

If there’s one benefit to writing about fashion rather than technology (besides, that is, the glamorous parties, the beautiful people, the exotic locations, and generally being cooler in nearly every conceivable way), it’s that trends are easily identifiable and manifest themselves in a way that’s tangible and seemingly instantaneous.... More Info


More Info Download Contact Author Share

Article
Protecting the Four Pillars: Physical, Data, Process, and Architecture

At the end of October, Adobe Systems announced that data belonging to 38 million of its customers had been obtained by hackers, who’d infiltrated the company’s systems at least two months earlier, along with the source code for three of its products. The server that housed Adobe’s database also housed a PR Newswire database of customer logins and passwords, which hackers stole and leveraged for various additional exploits, such as uploading fraudulent press releases.... More Info


More Info Download Contact Author Share

Search
search tips

Terms you want to exclude
(-) (minus)
Attaching a minus sign immediately before a word indicates that you do not want pages that contain this word to appear in your results. The minus sign should appear immediately before the word and should be preceded with a space.

Terms you want to include
(+) (plus)
Indicates that a term is REQUIRED to be present in each returned row.

* (asterisk) The asterisk is a wildcard operator - it must be appended to a word, instead of preceding it, and will match any term which begins with that sequence of characters.

Media Type
Upload Assets

Add Your Assets to the Research Center

Put your thought leadership materials where they can be found when your global target market is investigating companies, products, topics, trends, and technology related to your company.

UPLOAD CONTENT

Welcome to Pipeline's Knowledge Center. You can use the search feature to search across all media contained on the Pipeline site including articles, brochures, reports, webinars, whitepapers, and much more.

To begin, use the search box above to search by topic, and then filter your results by media type, date, or company. You can also select how results appear by specifying how many results appear per page and sorting your results by media type, relevancy, or company.