Tuesday, March 1, 2016

Splunk Leads Adaptive Response Initiative

Splunk is spearheading an Adaptive Response Initiative to connect with a community of best-of-breed security vendors to improve cyber defense strategies and security operations. The idea is to combine alert and threat information from multiple security domains and technologies.

Splunk said this collective insight enables security teams to make better-informed decisions across the entire kill chain, especially when validating threats and applying analytics-driven response directives to their security environment.

Founding participants of the Adaptive Response Initiative include Carbon Black, CyberArk, Fortinet, Palo Alto Networks, Phantom, Splunk, Tanium, ThreatConnect and Ziften.

“The mission of the Adaptive Response Initiative is to bring together the best technologies across the security industry to help organizations combat advanced attacks,” said Haiyan Song, senior vice president of security markets, Splunk. “Modern cyber threats are dynamic, and attackers are constantly finding new ways to get in and exploit networks and systems. This new challenge goes well beyond preventing individual stages of an attack. Adaptive Response aims to more effectively connect intelligence across best-of-breed technologies to help organizations improve their security posture, quickly validate threats, and systematically disrupt the kill chain.”

http://www.splunk.com

SanDisk and IBM Team on Software-Defined All-Flash Storage

SanDisk and IBM announced a collaboration focused on next-generation, software-defined, all-flash storage solutions for the data center.

The partnership brings together SanDisk’s InfiniFlash System—a high-capacity and extreme-performance flash-based software defined storage system with IBM Spectrum Scale filesystem, which a software-defined, distributed, parallel filesystem, for high performance, large scale workloads on-premises or in the cloud. Featuring the ability to automatically tier data based on application needs, the Spectrum Scale software-defined storage solution provides file, object, and integrated data analytics for:

  • Compute clusters (technical computing)
  • Big data and analytics
  • Cognitive computing
  • Hadoop Distributed File System (HDFS)
  • Private cloud
  • Content repositories

“Our initiative with IBM brings the best of both worlds to data centers: breakthrough economics compared to traditional all-flash array deployments, and dramatically higher performance, improved reliability and lower power consumption compared to hard disk drive-based arrays,” said Ravi Swaminathan, vice president and general manager, System and Software Solutions, SanDisk. “These offerings enable customers to economically deploy flash at petabyte-scale, which drive business growth through new services and offerings for their end-customers.”

http://www.sandisk.com

Monday, February 29, 2016

Top Twelve Cloud Computing Threats

The Cloud Security Alliance (CSA) Top Threats Working Group published a report listing The Treacherous 12: Cloud Computing Top Threats in 2016:

  • Data Breaches
  • Weak Identity, Credential and Access Management
  • Insecure APIs
  • System and Application Vulnerabilities
  • Account Hijacking
  • Malicious Insiders
  • Advanced Persistent Threats (APTs)
  • Data Loss
  • Insufficient Due Diligence
  • Abuse and Nefarious Use of Cloud Services
  • Denial of Service
  • Shared Technology Issues

"Our last Top Threats report highlighted developers and IT departments rolling out their own self-service Shadow IT projects, and the bypassing of organizational security requirements. A lot has changed since that time and what we are seeing in 2016 is that the cloud may be effectively aligned with the Executive strategies to maximize shareholder value," said Jon-Michael Brook, co-Chair of the Top Threats Working Group. "The 'always on' nature of cloud computing impacts factors that may skew external perceptions and, in turn, company valuations."

https://cloudsecurityalliance.org/

Gigamon Revs Metadata Engine for Contextual Security Analytics

Gigamon unveiled its Metadata Engine for their GigaSECURE Security Delivery Platform (SDP).

The solution centrally generates and aggregates contextual information about network traffic. It sends that metadata to the security analytics devices that can leverage the information.

The company said its Metadata Engine will ‘super-charge’ security information and event management systems (SIEMs), enabling forensics solutions and user behavioral analytics products to connect to its GigaSECURE Security Delivery Platform and receive output of the Metadata Engine, that includes:
  • NetFlow/IPFIX records
  • URL/URI information
  • SIP request information
  • HTTP response codes
  • DNS queries
  • DHCP queries (future)
  • Certificate information (future)
  • Custom data (future)
Gigamon also announced a number of ecosystem partners supporting this approach: FlowTraq, Lancope, now a Cisco company, LogRhythm, Niara, Plixer and SevOne.

“We want to enable our customers to drastically improve their security posture by taking advantage of the latest trends in security analytics,” said Shehzad Merchant, CTO, Gigamon. “By enabling both context and packet based security analytics, Gigamon’s customers benefit by improving their ability to uncover intruder threats faster.”

http://www.gigamon.com

Gigamon Launches Security Visibility Platform for Advanced Persistent Threats

Gigamon introduced its "GigaSECURE" Security Delivery Platform for providing pervasive visibility of network traffic, users, applications and suspicious activity, and then delivering it to multiple security devices simultaneously without impacting network availability.

The idea is to counter Advanced Persistent Threats (APTs) by leveraging a traffic visibility fabric to extract scalable metadata across a network, including cloud and virtual environments, and thereby empower third party security applications. This enables improved forensics and the isolation of applications for targeted inspection. The company also said its solution is also able to deliver visibility to encrypted traffic for threat detection.  The architecture supports inline and out-of-band security device deployments.

Gigamon's GigaSECURE is comprised of scalable hardware and software elements:

  • Infrastructure-wide reach via GigaVUE-VM and GigaVUE nodes;
  • High-fidelity, un-sampled Netflow/IPFIX generation;
  • Application Session Filtering;
  • SSL decryption; and
  • Inline bypass capabilities.
Gigamon also highlighted its Application Session Filtering (ASF), a new, patent-pending GigaSMART application that can identifies applications based on signature or patterns that appear within a packet or packets. Once positively identified, ASF extracts the entire session corresponding to the matched application flow from the initial packet to the last packet of the flow, even if the match occurs well after the first packet. This allows an administrator to forward specific “traffic of interest” to security appliances thereby optimizing their operational efficiency and improving overall performance.

The GigaSECURE platform already supports a broad ecosystem of security partners and their respective security functions, including:

Advanced Malware Protection: Check Point, Cisco, Cyphort, FireEye and Lastline;
Behavior Analytics: Damballa, Lancope, LightCyber and Niara;
Forensics/Analytics: ExtraHop, PinDrop, RSA and Savvius;
IPS: Check Point and Cisco;
NGFW: Check Point, Cisco, Fortinet and Palo Alto Networks;
Secure Email Gateways: Cisco;
SIEMs: LogRythm and RSA;
WAFs: Imperva.

https://www.gigamon.com/

Pica8 Cranks Up OpenFlow Switching by 1000x

Pica8 is introducing a Table Type Patterns (TTP) functionality in its PicOS network operating system that overcomes limitations in OpenFlow scaling for very large data centers.

The company said TTP enables its PicOS to scale to 2 million flows with Cavium’s XPliant switch ASIC, and to 256,000 flows with Broadcom’s StrataXGS Tomahawk switch ASIC. Typical TCAM flow capacity in the top-of-rack installed base today is between 1,000 and 2,000 flows, and with Pica8’s TTP implementation, production networks can scale 1,000 times more.

TTP defines how tables are set up in a switch, which an SDN controller can program via the OpenFlow switch protocol. The development of a TTP-based approach has been motivated by several factors, including: to maximize the available capacity, to better accommodate heterogeneity of existing hardware switches, to enable future innovation in hardware switches through more seamless SDN application development, and to enable granular and automated communication between application / controller developers and switch vendors.

“TTP and our own abstraction technology – vASIC -- unlock custom ASICs to bring choice, programmability and scale to application developers,” said Dan Tuchler, vice president of product management at Pica8. “Application developers no longer have to worry about the limitations or differences between ASICs when delivering their solutions to the market.”

TTP is in early release and will be generally available with PicOS in March.

http://www.pica8.com/news/pica8s-ttp-increases-sdn-scaling-on-data-center-switches-by-1000x

IBM to Acquire Resilient Systems for Security Incident Response

IBM agreed to acquire Resilient Systems, a leader in security incident response solutions, based in Cambridge, Mass. Financial terms were not disclosed.

Resilient Systems' incident response platform technology enables clients to respond to security breaches faster and with greater precision and coordination, allowing orchestration of response process across functions (security, HR, finance, government relations, etc.) and across security systems (those monitoring data, applications, end points, networks, etc.). It also helps clients to respond to increasing regulation.

"We are excited to be joining IBM Security, the industry's fastest-growing enterprise security company," said John Bruce, Resilient Systems Co-Founder and CEO. "By combining, the market now has access to the leading prevention, detection and response technologies available in the same portfolio – the security trifecta."

A major benefit will be the planned combinations of Resilient Systems' Incident Response Platform with IBM QRadar Security Intelligence Incident Forensics, BigFix, IBM X-Force Exchange and IBM Incident Response Services that can enable an orchestrated process for addressing security incidents.

IBM also launched new X-Force Incident Response Services, which include consulting and managed security services to help clients manage all aspects of responding to a cyber breach. IBM X-Force security experts will help clients develop response strategies, including Computer Incident Response Team playbooks, and a means to more effectively discover, track, respond to and report on security incidents.  These new capabilities will be further enhanced through the planned acquisition of Resilient Systems.

http://www-03.ibm.com/press/us/en/pressrelease/49243.wss

Trend Micro Cloud App Security Integrates Box, Dropbox and Google Drive

Trend Micro has extended its Cloud App Security solution to Box, Dropbox and Google Drive.

Cloud App Security capabilities include:

  • Guards against advanced threats with sandbox malware analysis
  • Uses DLP to provide visibility into sensitive data use with cloud file sharing
  • Detects malware hidden in office files using document exploit detection
  • Supports all user functionality and devices with simple API integration in the cloud
  • Integrates with Trend Micro Control Manager for central visibility of threat and DLP events across hybrid Exchange environments as well as endpoint, web, mobile, and server security layers.
  • Cloud App Security has been integrated with a number of leading marketplaces and cloud commerce platforms to give partners and customers a complete end-to-end purchasing and provision experience.

http://www.trendmicro.com

Check Point and IBM Form Threat Intelligence Alliance

Check Point Software Technologies and IBM announced an expanded alliance, including the sharing of threat intelligence, as the security industry moves to a more collaborative approach to defend against cybercrime.

The new alliance includes four main areas of collaboration:

  • Shared threat intelligence. An open approach to collaborative defense in the security industry is needed to effectively protect against new and evolving threats. IBM X-Force and Check Point’s security research team will directly collaborate through the bi-directional sharing of threat identification and analysis using IBM X-Force Exchange (XFE), IBM’s threat intelligence sharing platform. This collective threat intelligence may be integrated into each company’s threat intelligence products, to help deliver proactive threat protection to customers of both companies.
  • Integrated event management. Sharing capabilities across the security management platforms deployed by customers accelerates the company’s collective response to threat activity, and extends the value of security technology investments for clients. Check Point will be launching a new SmartConsole application in the IBM Security App Exchange for integration with the IBM Security QRadar Intelligence Platform. The app will deliver network data and security events from Check Point devices to QRadar to enable operators to view threat information in real-time directly from the QRadar console for faster incident response.
  • Advanced mobile protection. Integration within IBM Maas360 enterprise mobility management (EMM) will allow customers to easily deploy and manage Check Point Mobile Threat Prevention to limit compromised devices from accessing enterprise networks and data, based on real-time insights. The combination of these capabilities provides automated protection against advanced threats across mobile devices, apps and networks, while significantly simplifying the implementation and ongoing monitoring of mobile security technology across the enterprise.
  • Managed security services. IBM Managed Security Services (MSS) will continue to deepen its expertise in delivering and managing Check Point solutions for IBM customers. The deployment and management of a broader range of Check Point network security offerings will be supported through new lab equipment and ongoing training of IBM SOC analysts and solution architects, providing customers with cost-effective access to resources and expertise as their security requirements evolve.

“Today’s business environment is more connected and more innovative than ever before, requiring equally innovative ways to help customers keep a step ahead of possible threats,” said Avi Rembaum, vice president of security solutions, Check Point. “Both Check Point and IBM Security take a prevent-first approach to security. Through intelligence sharing and technology integration we aim to help improve our customers' security programs and create a new model for industry cooperation.”

http://www.ibm.com

Hibernia Networks Opens PoP in Dubai

Hibernia Networks has established a Point of Presence (PoP) in Dubai, UAE in one of the city's major telco hubs. The Ethernet-based connectivity service leverages the unmatched latency performance of the Hibernia Express cable across the Atlantic, which connects Europe and North America.

“With its strategic location, Dubai is a major international hub for financial markets as well as media and content distribution throughout the region and beyond,” states Omar Altaji, CCO of Hibernia Networks. “Hibernia Networks’ presence in Dubai confirms our commitment to strategically expanding our global network reach into new geographic locations in order to provide customers with the high-speed, high-quality connections they require around the globe for applications such as split second financial transactions and live broadcast feeds. We look forward to continued growth in key local and regional markets to better serve increasing global demand for secure and diverse low latency connectivity solutions.”

http://www.hibernianetworks.com

Krish Prabhu joins University of Texas (Arlington) Faculty

Krish Prabhu, president of AT&T Labs and chief technology officer, has been named to The University of Texas at Arlington's Engineering Hall of Achievement and appointed a research professor in the Department of Computer Science and Engineering. He will remain in his current role at AT&T while serving as a resource for UTA as it bolsters its research and teaching in his areas of expertise.

Prabhu previous was chief executive officer of Tellabs. Before that, he served as chief operating officer of Alcatel in Paris from 1991 to 2001.

http://www.att.com

Sunday, February 28, 2016

Blueprint: Enterprise Cloud is the “New Normal,” Now It’s About Making It Work

by Boris Goldberg, co-founder of Cloudyn

Predictions from 2014 suggested that enterprises would flock to the cloud, which actually happened. The spectacular growth that AWS has already enjoyed along with the estimates that by the end of 2015, AWS revenues would reach somewhere upwards of $7 billion, show that this market has evolved into something that is much more than what was anticipated. While Microsoft Azure is still in second place, it has also witnessed significant growth, more than that of AWS. In fact, its enterprise enrollment offering has extended the range of services to support enterprises in the cloud. Taking a look closer at both AWS and Azure, the impact they have had on traditional infrastructure budgets in enterprises is astonishing. So what can we expect to see as the year enfolds?

1. Multi-Cloud Plans
Today, a great deal of IT organizations and enterprises want to migrate to the cloud, and when they do, they usually stick with one IaaS provider (which is generally AWS, the market leader). However, they also recognize the need to reduce vendor lock-in and continue cultivating previously arranged business engagements. For example, if an organization has been working with Microsoft for the past ten years through Enterprise Agreement using its MSDN or Office packages, the CIO will still want to leverage these types of long term agreements in order to support the organization’s cloud initiatives.

So how is it even possible to bring two, three, or even four different vendors into one place where you can control them all from a single pane of glass? Coping with this challenge in 2016 will entail adopting cloud management and governance solutions that will help streamline cost control and even compliance between the different environments.

2. Administrator Job FUD
Provisioning resources online with just a credit card rather than through long, cumbersome IT procurement and provisioning processes has forced admins to acquire new skills in order to navigate and leverage the world of IaaS. And with more enterprises implementing the DevOps methodology, they will continue enhancing their agile adoption and will apply more automation when it comes to testing, and delivering full application stacks in the cloud.

It is up to IT organization leaders to ensure their administrator teams have job security to quell anxiety (fear, uncertainty and doubt) that is likely to surface. They must also offer ongoing guidance and required tools to make the shift to cloud and better ensure healthy, controlled cloud environments.

3. Sharpened Cloud Tool Belts
In 2015, we saw how production workloads from the largest enterprises in the world were moved to AWS. Today, enterprise IT leaders understand the public cloud’s economies of scale and recognize their ability to invest far more in aspects such as security. However, using a robust cloud offering does not mean that an environment will be robust. Management tools are still needed to ensure that cloud environments do not suffer from a lack of best practices when it comes to performance and security. While it’s critical that the infrastructure is well formed, enterprises also need to have the right tools and skills that are necessary to deploy and manage this highly dynamic and complex environment.

Throughout 2016, expect to see IT admins gain a deeper understanding of cloud implementation and best practices, as well as look for the right management tools in order to fulfill their side of the cloud’s shared responsibility model.

4. Cloud Financial Management
Users today are aware of the need to control their cloud costs, however cloud financial management is not only about costs. Values, such as delivery speed, flexibility, and even actual business revenues, which have been driven by leveraging the cloud, should also be recognized. This can be done by merging usage, performance and cost monitoring under one umbrella, which is where your cloud financial management solution comes into play. It should be able to show you how your cloud purchases have increased business performance.

2016 will embrace this shift in thought processes. IT leaders will recognize the great financial opportunities that the cloud has put in their hands and start making implementation plans for comprehensive financial management solutions.

5. The Hybrid Cloud has Landed
This year, we should expect to see hybrid clouds gain even more prominence, specifically in the discussion of financial and security management, with the focus of the year being how to manage and confront complex hybrid environments.      

Summary

Now that it’s clear that the business sector has embraced cloud computing and companies are implementing adoption or building environments, it's time to gain a deeper understanding. This means that the focus should be shifted to enhancing your personal skills and your team’s skills. With more sophisticated cloud operations, you will be able to create better alignment with your enterprise goals and ultimately allow IT to have a much bigger impact on business than ever before.

About the Author

Boris Goldberg is a co-founder of Cloudyn and serves as its Chief Technology Officer, responsible for its technology and architectural direction. Boris has more than 25 years of hands-on experience in configuration discovery, configuration management and business service management solutions. He served as Chief Architect for Evolven, and also served as Senior R&D Manager and Sr. Architect for BMC Performance Monitoring Solutions.



Got an idea for a Blueprint column?  We welcome your ideas on next gen network architecture.
See our guidelines.

Saturday, February 27, 2016

Preview #ONS2016 with Guru Parulkar

This year's Open Networking Summit is going to bring together everything in open source networking, says Guru Parulkar, Program Chair of ONS. Expect to see mini-summits of all the big open source projects underway. The event will also bring together builders, enterprise users and Service Providers at the forefront of SDN and NFV.

 

YouTube link: https://youtu.be/D2u1VhhAdZY

Open Networking Summit - March 14-16, 2016
Santa Clara Convention Center
Santa Clara, California
http://events.linuxfoundation.org/events/open-networking-summit


Preview #ONS2016 with Jim Zemlin

The Linux Foundation is bringing its unique industry standing to this year's #ONS2016, says Jim Zemlin, Executive Director of the Linux Foundation.  This relates directly to the big open source projects, including OpenDaylight, OPNFV, ONOS -- all of which are defining the future open source footprint of networking.




YouTube link: https://youtu.be/anx_IWMxIDE

Open Networking Summit - March 14-16, 2016
Santa Clara Convention Center
Santa Clara, California
http://events.linuxfoundation.org/events/open-networking-summit








Versa Networks Tightens Security for Branch Offices with SD-WAN

Versa Networks has expanded its FlexVNF software to enable service providers (through managed service offerings) and enterprise IT teams to evolve branch security infrastructure from legacy point appliances to a more agile and software-defined approach.

Versa has expanded its portfolio of SD-Security functionality in Versa FlexVNF, which incorporates  a next-generation firewall (NGFW), anti-virus capability, intrusion prevention and category/content filtering, to now include the following advanced functions:

  • DNS threat defense provides additional protection against attacks, APTs and malware and uses big data analytics and machine learning intelligence to automate protection against both known and emerging threats.
  • An SWG provides granular control of and visibility into outbound web traffic to enforce security and corporate policies as well as protection at the browser layer.

Both of these new SD-Security capabilities can be located at the branch office or delivered from the telco cloud, depending on customer requirements and/or the managed service design.

One Versa FlexVNF software instance, running on one RU unit of commodity x86 hardware, can provide up to 40 Gbps of stateful firewall, 20 Gbps of NGFW or 10 Gbps of unified threat management (UTM) – double the capacity of the leading proprietary hardware-based solutions. Because the Versa solution is software-defined, new capacity can be added quickly and new functions can be turned on in minutes.

“Versa FlexVNF is redefining branch security for enterprises and managed security for providers by combining defense-in-depth with the agility and flexibility of software-defined security,” said Kumar Mehta, CEO and founder of Versa Networks. “Branch security has become vital in 2016 and beyond as attackers zero in on branches as the next vulnerable entry point, especially when direct Internet access is enabled. The problem we’re seeing is that most branch offices are not offering enough layers or depth of security – and software-defined security can be the solution.”

http://www.versa-networks.com

Microsemi Targets 400G Metro Optical with DIGI-G4 OTN Processor

Microsemi announced  mass production of its DIGI-G4, its latest DIGI Optical Transport Network (OTN) processor enabling the transition to 400G OTN switching solutions in metro transport networks.

Microsemi's DIGI-G4 enables network equipment vendors to double the 100G OTN port density on their optical transport systems, while achieving a 50 percent reduction in power per 100G port.

Some highlights:

  • Industry's first single-chip 4x100G solution for OTN switched line cards
  • Integrated 100G gearbox for direct connect to CFP2, CFP4 and QSFP28 transceivers
  • Industry's highest density 10G, 40G and 100G multi-service support, including Ethernet, storage, IP/MPLS and SONET/SDH
  • Industry's first sub-wavelength OTN encryption solution to secure the cloud
  • Industry's first 25G granularity flexible framer to DSP interface providing scalable line-rates to match the programmable modulation capabilities found in next-generation coherent DSPs
  • Multi-chip Interlaken interconnect solutions for scalable compact chassis data center interconnect applications
  • High performance OTN-SDK with adapter layer software accelerates customer time-to-market


"We have been working very closely with some of the world's leading original equipment manufacturers to complete Carrier qualification of their 400G OTN designs," said Babak Samimi, vice president and business unit manager of Microsemi, Communications business unit. "This year we will see our DIGI-G4 deployed in networks worldwide as the key technology for driving the transition to 400G OTN switching, in addition to enabling a new wave of flexible optical transport infrastructure that is software-defined networking (SDN)-ready and delivers on the security needs being demanded for cloud-connectivity powered by our embedded encryption engine."

http://www.microsemi.com/applications/communications

  • In January 2016, Microsemi completed its acquisition of PMC-Sierra in a deal valued at approximately $2.5 billion.

PMC's DIGI-G4 Processor Scales OTN Line Card Capacity by 4X

PMC-Sierra has commenced sampling of its new DIGI-G4 chip -- the industry's highest density 4x100G OTN processor and featuring 50 percent less power per port than the previous generation.

The DIGI-G4 OTN processor, which builds on the success of PMC’s DIGI-120G, enabling the transition to 400G line cards in packet optical transport platforms (P-OTP), ROADM/WDM and optimized data center interconnect platforms for OTN switched metro networks. It increases 10G, 40G and 100G line card port density by 4X with flexible client mapping of Ethernet, storage, IP/MPLS and SONET/SDH, while reducing power by 50 percent per port. DIGI-G4 builds on the IP from DIGI-120G, enabling customers to maintain their rich feature set and software investment, which reduces time to market by up to six months and lowers development costs.

Significantly, DIGI-G4 delivers multi-rate, sub-180ns latency OTN encryption, allowing cloud and communications service providers to ensure security without compromising performance. DIGI-G4 supports sub-wavelength OTN encryption and is compatible with OTN switched networks. PMC said these these capabilities, combined with the densest 10G/40G/100G Ethernet ports, enables a new class of low-power, high-capacity transport platforms optimized specifically for the hyperscale data center WAN interconnect market (see whitepaper).

Friday, February 26, 2016

AT&T Announces Labor Accord in Southwest

AT&T announced a tentative agreement with the Communications Workers of America in Mobility contract negotiations in CWA District 6 (AT&T's Southwest region).

The deal was reached prior to expiration of the extended contract at 11:59 p.m. Central Time Feb. 28. It covers more than 9,400 Mobility employees in Arkansas, Kansas, Missouri, Oklahoma, and Texas.

http://www.att.com/corewirelinebargaining

Mediatek Unveils Ultra Power-Saving Mobile Processor

MediaTek introduced an "ultra power-saving" mobile processor for the next generation of smartphones.

The MediaTek Helio P20, which promises 25 percent better power efficiency than its predecessor, leverages 16nm process technology and is the world’s first SoC to support low power double data rate random access memory – LPDDR4X.  The processor features upgraded CPU and GPU capabilities with its True Octa-Core architecture clocked up to 2.3GHz, taking full advantage of ARM Cortex A53 cores. A new Mali T880 graphics unit is clocked at 900MHz.

The MediaTek Helio P20 integrates an LTE Cat.6 modem with 2x20 carrier aggregation for 300/50Mbps top data speeds. The SoC supports global Dual-SIM Dual Standby. For regions where GSM is no longer available, the SoC will have simultaneous standby on WCDMA network. Additionally, MediaTek Helio P20 supports LTE multimedia broadcast and multicast service. This allows mobile devices to receive HD video content over LTE.

For improved processing power and optimum battery performance, MediaTek Helio P20 integrates LPDDR4X, providing 70 percent more bandwidth than the LPDDR3 and 50 percent power savings by lowering supply voltage to 0.6v, resulting in a quicker, smoother user experience for camera, video and gaming apps.

“MediaTek designed the MediaTek Helio P20 to meet today’s consumer demand for sleek, powerful yet highly power efficient mobile devices,” said Jeffrey Ju, Executive Vice President and Co-Chief Operating Officer at MediaTek.

http://www.mediatek.com

DOCOMO Partners with Mediatek on 5G Access

NTT DOCOMO is working with MediaTek of Taiwan to jointly develop and conduct trials of technology that will enable increased data capacity for 5G systems.

The trials, which will be conducted in either Taiwan or Japan from 2017 onwards, will develop a communication system to combine non-orthogonal multiple access (NOMA) wireless access technologies from DOCOMO and multi-user interference cancellation (MUIC) technologies from MediaTek. NOMA multiplexes signals at a base-station transmitter to leverage the increased signal processing capacity of a user device to cancel interference among multiplexed user signals. MUIC utilizes receiver antennas to remove interference from other users and increase capacity when a base station transmits a signal to a number of users at the same time.

The two companies will also study a new 5G Radio Access Technology and chipsets required for 5G devices, with joint trials to be carried out from 2018 onwards.

"DOCOMO is excited to work with MediaTek, an innovator with expertise in the technical requirements of 5G," said Seizo Onoe, Executive Vice President and Chief Technology Officer at DOCOMO. "The potential opportunities for 5G to enable people to connect with devices are endless. We're eager to see our 5G network inspire innovative inventions to benefit technology, life and business."

https://www.nttdocomo.co.jp/english/info/media_center/pr/2016/0222_01.html

See also