Technology News from Around the World, Instantly on Oracnoos!

CyberTowns Initiative Aims to Spotlight Canada’s Top Locations for Cybersecurity Careers - Related to a, 2024, pricing:, musk's, trending

AT&T, T-Mobile and Verizon might get a better alternative to Musk's Starlink

AT&T, T-Mobile and Verizon might get a better alternative to Musk's Starlink

– CTO CEO Charles Delfieux, February 2025.

CTO uses 5G mmWave technology, which operates between 24-100 GHz, allowing for very fast wireless communications. The French-based corporation’s constellation of satellites will take advantage of the currently underutilized 26 GHz radio frequency.

Additionally, these are just some of the advantages of Musk’s Starlink, but. In order to compete with SpaceX, CTO needs to finish its constellation first. The French firm.

It remains to be seen if CTO will want to bring its satellite coverage to the US and whether or not carriers will acquire the French-based business’s services. But it’s a very enticing possibility. Typically, SpaceX’s Starlink and Amazon’s Kuiper operate on the Ku- and Ka- frequency bands ( GHz – 40 GHz), which are dangerously close to becoming congested due to the surge in new space uses 5G mmWave technology. Which operates between 24-100 GHz, allowing for very fast wireless communications. The French-based business’s constellation of satellites will take advantage of the currently underutilized 26 GHz radio are just some of the advantages of Musk’s Starlink, but. In order to compete with SpaceX, CTO needs to finish its constellation first. The French business introduced plans to launch a constellation of 1,500-3,400 satellites. The first two will be launched next year while the rest should start orbiting Earth between 2027 and remains to be seen if CTO will want to bring its satellite coverage to the US and whether or not carriers will acquire the French-based business’s services, but. It’s a very enticing possibility.

Currently, T-Mobile’s Starlink is the only space-based mobile network in the United States that automatically connects to a phone even where there’s no cellular network coverage. The US has about 500,000 square miles where there’s no cellular signal at all. So the only possible way to communicate via a phone is to use Starlink’s satellite service. However, a French startup is currently building a constellation of Very Low Earth Orbit (VLEO) telecom satellites, and. The first tech demonstration flight is scheduled to launch in June. Constellation Technologies and Operations (CTO) is a Paris-based startup that has a very different business model than Musk’s Starlink. Instead of directly competing with carriers to offer their own services to end users like Starlink does, CTO will provide terrestrial network operators like AT&T Verizon and. Others with shared access to its space-based telecom what is CTO getting in return for allowing all these carriers to access its space-based telecom services it operates? It’s pretty simple: access to the carriers’ customer bases, meaning billions of approach is not even more intelligent, but. The constellation that CTO is building seems to be superior to Musk’s Starlink, at least on paper. First off, the company has already integrated its Early Test payload into D-Orbit’s ION satellite platform, marking the first-ever use of 5G mmWave spectrum for high-speed. Low-latency satellite internet transmission. Another important benefit of having a CTO satellite connection rather than one managed by Starlink is that the former’s satellites are orbiting closer to the Earth, which means faster internet speeds and lower latency.

Amid continued delays for its One UI 7 revision. Samsung is now launching three new phones that come with the revision out of the box with the new Galaxy ...

If you're seeing this message, that means JavaScript has been disabled on your browser.

Please enable JavaScript to make this website work...

Broadcom backs down on VMWare pricing: Hashtag Trending for Wednesday, April 17, 2024

Broadcom backs down on VMWare pricing: Hashtag Trending for Wednesday, April 17, 2024

YouTube clamps down on third party apps that block ads. Experts predict a new cyber-war between Iran and Israel. Elon Musk backs down on his fight with the Brazilian government and Broadcom makes concessions in the face of customer outrage and European regulatory scrutiny of its new VMWare pricing.

All this and. More on the “who blinks first” edition of Hashtag Trending. I’m your host, Jim Love. Let’s get into it.

YouTube is escalating its battle against ad-blocking software and extensions. The video streaming giant has revealed it will now crack down on third-party apps that allow clients to skip ads on YouTube videos.

It’s an expansion of YouTube’s existing efforts to discourage viewers from using ad blockers when watching videos on the platform. Last year, YouTube started displaying error messages and disabling videos for clients with ad-blocking browser extensions enabled.

While the ad-blocking app AdGuard says it is not affected by this latest policy change since it doesn’t use YouTube’s API, many other apps that scrape ad-free YouTube videos could face blockages.

Of course. YouTube still offers its premium ad-free subscription as an alternative for viewers who want to skip commercials. But this crackdown likely won’t be welcomed by those who prefer watching YouTube through adblocking software and mobile apps.

There’s been a reversal from Elon Musk’s social media organization X. Formerly known as Twitter, over its stance on complying with court orders in Brazil regarding content moderation. After initially vowing to challenge rulings by Brazil’s Supreme Court, lawyers for the platform have now told the court it will follow all its decisions.

A legal battle has been brewing between Elon Musk’s X firm and Brazil’s top court over the removal of certain accounts accused of spreading misinformation and. Hate speech. Last week, Musk noted he would challenge an order from Supreme Court Justice Alexandre de Moraes demanding X block some accounts in the country.

But in a letter to Moraes seen by Reuters, lawyers for X have now reversed course, stating the platform will comply with every ruling issued by the Supreme Court or Brazil’s top electoral authority.

This marks a shift from X’s Brazilian subsidiary, which had previously claimed it could not control whether the parent corporation followed the Brazilian court’s orders.

The Supreme Court justice has been leading investigations into alleged coup attempts and digital militias accused of spreading disinformation, particularly during the presidency of Jair Bolsonaro.

Musk. Who has branded himself a free speech absolutist, had called Moraes’ orders unconstitutional and demanded he resign – prompting the justice to open an inquiry into Musk for potential obstruction.

The reversal by X’s lawyers likely aims to defuse tensions with Brazilian authorities. However, the House Judiciary Committee has now subpoenaed X for information about the Brazilian court’s content moderation orders.

As social media’s role in democracies remains hotly contested, US social media giants are finding that they are not immune to government regulation in other countries.

A former security executive at the ride-sharing business Uber is taking on a new role advising other corporate leaders on how to properly handle cyber-attacks and. Data breaches. Joe Sullivan was convicted last year for his actions in covering up a 2016 data breach at Uber and obstructing a federal investigation into it.

A federal judge sentenced him to three years probation and community service His case is believed to be the first time a security executive faced criminal charges related to mishandling a data breach.

Sullivan is now working with a cybersecurity firm to help prevent other executives from making the same mistakes he did.

Since then, Sullivan has been reflecting on his experiences and. Sharing advice with other security leaders on how to properly respond when cyberattacks happen. He’s now joining the cybersecurity firm BreachRx as a senior advisor. The corporation provides a platform to automate and document a corporation’s response in the crucial first hours after a breach is detected.

Sullivan says security executives are facing growing legal risks as regulators crack down on poor cybersecurity practices and. Demand more accountability from companies hit by data breaches. But he argues chief security officers are often underfunded and understaffed, making it difficult to properly secure their networks. Sullivan hopes his case will prompt companies to finally invest more in cybersecurity – though he’s concerned some recent regulatory actions may be prompting an overcorrection, with security chiefs now afraid to take responsibility during incidents.

And with that hanging over them. Is it any wonder companies struggle to find senior security talent?

Tensions are high between Iran and Israel following a missile attack over the weekend. As both sides weigh their next moves, cybersecurity experts are warning a cyberbattle could be looming as part of the conflict.

Israel and Iran have a long history of cyberwarfare. Launching destructive computer viruses and hacking attacks against each other over the years. But this weekend’s missile strike from Iranian territory into Israel marks an unprecedented escalation in the overt hostilities between the two nations.

And as both sides now contemplate retaliation, cybersecurity analysts say we should brace for a potential onslaught of high-stakes cyberattacks.

Andrew Borene, a cyber analyst with the security firm Flashpoint says that “The overt hostility and. The overt physical aspects of the state-on-state confrontation moved things into a different sphere.”.

He says cyberattacks could allow Iran and Israel to strike back at each other without risking mass casualties from further missile launches.

Both countries have highly sophisticated cyber capabilities. Iran has used data-wiping malware against other nations. A decade ago, the and Israel jointly deployed the Stuxnet computer virus to disrupt Iran’s nuclear program.

The cyberwarfare has already begun spilling over from the latest missile exchange. Hacking groups linked to Iran, Russia and others have in the recent past taken down Israeli emergency services apps and. News websites as part of the ongoing conflict with Palestinian militants in Gaza.

Cyber warfare is increasingly used by nation states. Since that time there have been many examples of state sponsored attacks. in the recent past, after France committed greater support to Ukraine, they were hit by a massive cyber-attack. And now, we risk an all-out cyber war between Iran and. Israel.

The problem is that these attacks often spill over to become a much wider threat. The malware that is created escapes into the wild and provides new tools for the armies of hackers who threaten our corporate and civic infrastructure.

While officials claim to have so far seen no major cyberattacks stemming from the weekend’s missile strike, analysts expect that could change quickly as Israel weighs its response and both sides enter uncharted territory in their bitter. Long-running dispute.

There’s been a potential reprieve for some VMware end-people unhappy with the new licensing policies put in place by the enterprise’s new owner, semiconductor giant Broadcom. The move comes as regulatory scrutiny of the changes intensifies in Europe.

When Broadcom acquired VMware last year in a massive $61 billion deal, it introduced plans to shift VMware’s product licensing to a subscription model and. Bundle the virtualization software into a new enterprise IT platform.

The changes drew an angry backlash from many VMware end-consumers accustomed to perpetual licensing and concerned about higher long-term costs. A number of them demanded Broadcom preserve perpetual licensing options.

Now. Broadcom’s CEO Hock Tan says the organization is offering some concessions in response to that customer feedback. In a blog post, Tan revealed that Broadcom will provide free security patching for some supported versions of VMware’s products, even for consumers persisting with older perpetual licenses rather than new subscriptions.

Tan also acknowledged Broadcom has granted renewal extensions to many VMware consumers to give them more time to adapt to the new model.

The moves come as European antitrust regulators have started questioning Broadcom over its licensing changes following complaints from some tech associations. Analysts believe it could also be an effort by Broadcom to stem a potential mass customer exodus from VMware’s products.

The research firm Gartner not long ago predicted that VMware’s market share in hyperconverged infrastructure – which combines storage, computing and networking – is poised to plummet from 70% currently down to just 40% by 2029 as clients look to revirtualize and. Switch vendors.

As the tech world’s latest mega-merger continues shaking out, this could mark the first significant compromise by Broadcom in its controversial effort to overhaul the VMware business.

And that’s our show for today. Love to hear your opinions as always. You can reach me at or our new editorial address – .

Our show notes are now also posted at or . com take your pick – along with other stories. Check it out.

I’m your host Jim Love, have a Wonderful Wednesday..

Samsung’s Galaxy S25 Ultra is not a thin phone. It doesn’t have an especially ergonomic design, nor is it what I’d call sexy — but I didn’t expect it ...

A new program called CyberTowns is setting out to identify the best communities across Canada to start and grow a career in the cybersecurity and. IT f...

The Xiaomi Watch S4 has arrived on the global stage and it has some big shoes to fill - its predecessor is a hugely popular wearable.

CyberTowns Initiative Aims to Spotlight Canada’s Top Locations for Cybersecurity Careers

CyberTowns Initiative Aims to Spotlight Canada’s Top Locations for Cybersecurity Careers

A new program called CyberTowns is setting out to identify the best communities across Canada to start and grow a career in the cybersecurity and. IT fields. Launched by the Canadian Cybersecurity Network and IT World Canada, the initiative will evaluate cities on factors like job opportunities, affordability, population growth, taxes, crime rates, weather. Health amenities, community support, and internet access.

The goal is to highlight the unique advantages different municipalities offer in attracting and retaining cyber and IT talent. With cybersecurity skills in high demand, CyberTowns aims to showcase the locales positioned to thrive in this increasingly crucial industry.

“Cybersecurity professionals are a precious commodity in today’s digital economy,” stated Francois Guay. Founder of the CyberTowns program. “This initiative will recognize the cities cultivating environments where cyber careers can truly flourish.”.

The six-month evaluation process involves surveying cybersecurity and IT professionals across Canada. As well as an analysis of key statistical data. Only communities with a population over 100,000 will be considered for the rankings.

An independent review committee will assess the findings before the results are ’s advantages, challenges. And efforts to drive cybersecurity growth. Provincial and federal policies impacting the cyber workforce will also be examined.

The culmination will be an awards ceremony at the Canadian Identity Summit in Ottawa on April 30-May 1, 2024. Where Canada’s top “CyberTowns” fostering cyber talent will be celebrated.

Partnership opportunities are available for sponsors looking to support this initiative highlighting the nation’s cybersecurity hubs. Interested organizations can visit the CyberTowns website.

As cyberthreats continue to escalate, nurturing skilled cyber professionals has become an economic and. Security imperative for communities across Canada. The CyberTowns program promises to shine a light on the cities rising to meet that challenge.

Samsung unveiled Project Moohan alongside Android XR in December, and. Provided another look alongside the Galaxy S25 launch in January. Samsung’s And...

Vidyard, a popular video messaging business, has lately introduced its entry into the virtual digital avatar market and. Secured new funding of $15M fr...

Market Impact Analysis

Market Growth Trend

2018201920202021202220232024
7.3%8.8%9.3%10.3%10.8%11.2%11.3%
7.3%8.8%9.3%10.3%10.8%11.2%11.3% 2018201920202021202220232024

Quarterly Growth Rate

Q1 2024 Q2 2024 Q3 2024 Q4 2024
10.6% 10.8% 11.1% 11.3%
10.6% Q1 10.8% Q2 11.1% Q3 11.3% Q4

Market Segments and Growth Drivers

Segment Market Share Growth Rate
Smartphones42%8.7%
Mobile Applications26%14.5%
Mobile Infrastructure17%12.8%
Wearables11%18.9%
Other Mobile Tech4%9.4%
Smartphones42.0%Mobile Applications26.0%Mobile Infrastructure17.0%Wearables11.0%Other Mobile Tech4.0%

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity:

Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity AI/ML Blockchain VR/AR Cloud Mobile

Competitive Landscape Analysis

Company Market Share
Apple24.3%
Samsung22.7%
Huawei14.2%
Xiaomi11.8%
Google Pixel5.4%

Future Outlook and Predictions

The Mobile Verizon Might landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:

Year-by-Year Technology Evolution

Based on current trajectory and expert analyses, we can project the following development timeline:

2024Early adopters begin implementing specialized solutions with measurable results
2025Industry standards emerging to facilitate broader adoption and integration
2026Mainstream adoption begins as technical barriers are addressed
2027Integration with adjacent technologies creates new capabilities
2028Business models transform as capabilities mature
2029Technology becomes embedded in core infrastructure and processes
2030New paradigms emerge as the technology reaches full maturity

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:

Time / Development Stage Adoption / Maturity Innovation Early Adoption Growth Maturity Decline/Legacy Emerging Tech Current Focus Established Tech Mature Solutions (Interactive diagram available in full report)

Innovation Trigger

  • Generative AI for specialized domains
  • Blockchain for supply chain verification

Peak of Inflated Expectations

  • Digital twins for business processes
  • Quantum-resistant cryptography

Trough of Disillusionment

  • Consumer AR/VR applications
  • General-purpose blockchain

Slope of Enlightenment

  • AI-driven analytics
  • Edge computing

Plateau of Productivity

  • Cloud infrastructure
  • Mobile applications

Technology Evolution Timeline

1-2 Years
  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream
3-5 Years
  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging
5+ Years
  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

Expert Perspectives

Leading experts in the mobile tech sector provide diverse perspectives on how the landscape will evolve over the coming years:

"Technology transformation will continue to accelerate, creating both challenges and opportunities."

— Industry Expert

"Organizations must balance innovation with practical implementation to achieve meaningful results."

— Technology Analyst

"The most successful adopters will focus on business outcomes rather than technology for its own sake."

— Research Director

Areas of Expert Consensus

  • Acceleration of Innovation: The pace of technological evolution will continue to increase
  • Practical Integration: Focus will shift from proof-of-concept to operational deployment
  • Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
  • Regulatory Influence: Regulatory frameworks will increasingly shape technology development

Short-Term Outlook (1-2 Years)

In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing mobile tech challenges:

  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream

These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.

Mid-Term Outlook (3-5 Years)

As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:

  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging

This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.

Long-Term Outlook (5+ Years)

Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:

  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.

Key Risk Factors and Uncertainties

Several critical factors could significantly impact the trajectory of mobile tech evolution:

Battery technology limitations
Privacy concerns
Device interoperability issues

Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.

Alternative Future Scenarios

The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:

Optimistic Scenario

Rapid adoption of advanced technologies with significant business impact

Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.

Probability: 25-30%

Base Case Scenario

Measured implementation with incremental improvements

Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.

Probability: 50-60%

Conservative Scenario

Technical and organizational barriers limiting effective adoption

Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.

Probability: 15-20%

Scenario Comparison Matrix

FactorOptimisticBase CaseConservative
Implementation TimelineAcceleratedSteadyDelayed
Market AdoptionWidespreadSelectiveLimited
Technology EvolutionRapidProgressiveIncremental
Regulatory EnvironmentSupportiveBalancedRestrictive
Business ImpactTransformativeSignificantModest

Transformational Impact

Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.

The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.

Implementation Challenges

Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.

Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.

Key Innovations to Watch

Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.

Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.

Technical Glossary

Key technical terms and definitions to help understand the technologies discussed in this article.

Understanding the following technical concepts is essential for grasping the full implications of the security threats and defensive measures discussed in this article. These definitions provide context for both technical and non-technical readers.

Filter by difficulty:

5G intermediate

algorithm

wearable intermediate

interface

API beginner

platform APIs serve as the connective tissue in modern software architectures, enabling different applications and services to communicate and share data according to defined protocols and data formats.
API concept visualizationHow APIs enable communication between different software systems
Example: Cloud service providers like AWS, Google Cloud, and Azure offer extensive APIs that allow organizations to programmatically provision and manage infrastructure and services.

scalability intermediate

encryption

platform intermediate

API Platforms provide standardized environments that reduce development complexity and enable ecosystem growth through shared functionality and integration capabilities.