Avatar photo

Alistair Miller

Our resident Mobile, Network and DevOps expert is Alistair Miller. With a finger on the pulse of emerging technologies, Alistair's body of work is a favorite among businesses looking to quickly harness the benefits of new tech. With an expansive portfolio dedicated to technology, Alistair produces content that keeps readers on the cutting edge. 
Cisco and DISH Wireless Collaborate: Pioneering 5G Network Slicing Technology
Networking
Cisco and DISH Wireless Collaborate: Pioneering 5G Network Slicing Technology

In an ambitious step forward for 5G deployment, Cisco and DISH Wireless have embarked on a groundbreaking partnership. The two industry giants are testing a new network slicing technology that aims to completely transform the way 5G services are managed and delivered within hybrid cloud environments. With this initiative, both companies are targeting enhanced SLAs and efficient segmentation of network

Read More
Vampire Attacks in Crypto: Navigating Competitive Poaching in DeFi
DevOps
Vampire Attacks in Crypto: Navigating Competitive Poaching in DeFi

In the dynamic realm of cryptocurrency, DeFi, or decentralized finance, revolutionizes conventional monetary services. Within this innovative sphere, a new tactic known as a “vampire attack” has taken shape. These economic onslaughts involve emerging blockchain entities, or forks, siphoning off users and resources from well-established competitors by presenting more attractive incentives or improved functionalities. Grasping the intricacies of these aggressive

Read More
How Will Kyndryl and HPE Revolutionize Enterprise Connectivity?
Networking
How Will Kyndryl and HPE Revolutionize Enterprise Connectivity?

The strategic partnership between Kyndryl and Hewlett Packard Enterprise marks a significant development in business IT infrastructure. This collaboration aims to harness the power of private LTE and 5G technologies, ushering in a new era of connectivity and digital operations for companies. As these two industry giants combine their expertise, they stand to create a groundbreaking enterprise IT landscape, characterized

Read More
The Next Wave: Transformative Advances in Mobile Computing Technology
Mobile
The Next Wave: Transformative Advances in Mobile Computing Technology

We are on the cusp of an exciting new chapter in mobile computing that holds the potential to revolutionize our engagement with everyday technology. This upcoming age is marked by groundbreaking innovations that intertwine advanced technology with user-focused design. Every interaction, from simple taps to complex voice commands, promises to herald unparalleled experiences and connectivity. This is not just an

Read More
Avalanche Blockchain Pauses: Mempool Bug Triggers Technical Halt
DevOps
Avalanche Blockchain Pauses: Mempool Bug Triggers Technical Halt

Recently, the Avalanche blockchain encountered a disruption in its block production, causing unease among users and investors. Kevin Sekniqi of Ava Labs responded, suggesting that a new “scription wave” feature might be responsible. Initially thought to be a complex bug, the interruption was actually due to basic operational issues related to transaction processing within the mempool. This shows that even

Read More
How Is China Tackling Blockchain and Metaverse Crimes?
DevOps
How Is China Tackling Blockchain and Metaverse Crimes?

As technological innovation skyrockets, with blockchain and the metaverse at the forefront, the legal world faces new and complex challenges. These digital advancements, while brimming with potential, also harbor nefarious activities that can thrive within their uncharted territories. China is responding with stringent measures, intensifying its enforcement against online crime to maintain order in these fast-evolving sectors. This crackdown echoes

Read More
How Is Altr Using Blockchain to Revolutionize Luxury Asset Liquidity?
DevOps
How Is Altr Using Blockchain to Revolutionize Luxury Asset Liquidity?

Unlocking Liquidity with TokenizationUnlocking the value of luxury collectibles has long been a pain point for many enthusiasts. Traditional methods involving auction houses or pawn shops often lead to undervaluation or extensive waiting periods. Altr is creating a significant shift in this dynamic by harnessing the power of blockchain technology. By tokenizing high-value items on the Polygon blockchain, Altr provides

Read More
How Do Fibre Channel and Fibre Channel over Ethernet Compare?
Networking
How Do Fibre Channel and Fibre Channel over Ethernet Compare?

Fiber Channel (FC) and Fiber Channel over Ethernet (FCoE) are two key technologies that have shaped data center communication, enabling the transfer of large volumes of data. FC, an established high-speed network technology, has been fundamental for storage area networks (SANs) due to its reliability and performance. It operates independently of the Ethernet protocol, dedicated to handling storage communications. On

Read More
Embracing Network Evolution: Strategies for Advanced Automation Success
Networking
Embracing Network Evolution: Strategies for Advanced Automation Success

The field of networking is changing at an unprecedented pace, with automation taking center stage in transforming enterprise network infrastructures. This article explores the critical components that are shaping the future of network management, as explained by network automation expert Jason Edelman. Here, we examine the significance of a Source of Truth, the transition from homegrown tools to API-driven solutions,

Read More
KeyTrap Attack Exposes Critical Vulnerability in Global DNSSEC Protocol
Networking
KeyTrap Attack Exposes Critical Vulnerability in Global DNSSEC Protocol

The discovery of a critical flaw within the DNSSEC protocol has raised serious concerns regarding the integrity of a foundational component of internet security. Known as the KeyTrap attack, this vulnerability has the potential to undermine user trust and disrupt the authenticity of communications across the web. Understanding DNSSEC and the KeyTrap Vulnerability What is DNSSEC? DNSSEC safeguards web requests

Read More
Huawei Unveils Pocket 2: A Fusion of Luxury and Power in Foldables
Mobile
Huawei Unveils Pocket 2: A Fusion of Luxury and Power in Foldables

Huawei’s latest marvel in the foldable smartphone arena, the Huawei Pocket 2, has made a grand entrance. This device not only builds upon the success of its predecessor, the P50 Pocket, but also redefines the fusion of top-notch technology with sleek design. The Pocket 2 elevates the user experience with enhanced performance and compactness, while its design exudes luxury appeal

Read More
How Will Dojima Network Shape Web3’s Omnichain Future?
DevOps
How Will Dojima Network Shape Web3’s Omnichain Future?

The blockchain industry faces a critical challenge: different blockchains can’t easily communicate or exchange data, leading to isolated networks that slow down its progress. To tackle this problem, the Dojima Network has emerged as a promising solution. Recognized by the Cointelegraph Accelerator program, Dojima aims to forge connections between these disparate blockchain networks. Its goal is to create a more

Read More