The advent of 5G technology signifies the start of an even more globally connected society, a completely digital society. This technology, expected to be implemented in 2020, will change the way we interact with each other and objects, allowing us to be permanently connected, both to other people, and to everyday objects like the refrigerator or car.The Internet of things boom is imminent, and depends directly on the evolution of communications networks and the arrival of 5G technologies.
Over the last year colleagues have written blog posts on digital transformation and the new technologies within the telecommunications industry that are accompanying this phenomenon. However, I would like to take a step back and look at the digital transformation from a more business perspective.
Some have classified the digital transformation as the Fourth Industrial Revolution, where the markets, both clients and suppliers, are experiencing huge changes with the introduction of digital technology.
The application of power electronics to communications devices has to do with the processing of the electrical input power using semiconductor devices and reactive elements.
Thus, the raw input power is processed according to a control input that conditions the output power. This conditioning can be carried out by DC/DC converters – that convert the DC input voltage into another DC voltage with different magnitude and possibly isolated or even inverted polarity or through AC/DC converters that produce DC voltage from an AC input voltage.
The first and so far the only time I was personally involved, (or to be more precise my son who at that time was eleven years old), in a cyber-attack by ransomware was in 2012. The computer of my son was apparently blocked by the Federal Criminal Police Office due to some illegal actions, such as sending spam mails and even worse. At least that’s what appeared on the screen in poor German. Strangely enough a fee of 100 Euros would unblock the computer. Well, I wondered how the 100 Euros would affect the illegal activities, my eleven year old boy had committed but you never know. Even though it was obvious that we didn’t get into trouble with the public authorities, my son was not amused by the fact that his computer was out of order. In fact, he must have felt exactly how the latest cyber attack has been dubbed: WannaCry.
Nowadays, if you check the public IP address with which you access the Internet, you will find that it often changes.
This is due to the chronic shortage of IPv4 addresses, which are insufficient to cover current service demands. ISPs, therefore, often assign dynamic public IP addresses and mechanisms, such as Carrier Grade NAT (CGNAT), to allow various client devices to connect through a single IP address. Whilst IPv6 emerged to resolve this difficulty, migration to this protocol has proved a real challenge and not advanced as quickly as expected.