search

Copper network switch off during Rugby World Cup 2019

For all Wallabies aficionados, Australia’s opening campaign of the Rugby World Cup 2019 kicks off against Fiji on Saturday, 21 September in Sapporo, Japan. No doubt, Australian fans will be hoping to see the Wallabies super-fit and fully-prepared to return to their former glory days. Meanwhile, at around the same time, in a business district near you, the copper network switch off will get underway. Telstra will start disconnecting copper ISDN services as NBN Co brings business-grade networking solutions online.

Topics: Management Unified Communications Connectivity

#MWC19 – Day 2: what will 5G bring us?

 

We’ve all heard that the coming 5G networks promise low latency – as low as 1 ms – and very fast speeds up to and possibly over 1Gbps, as well as the increased capacity to carry many more simultaneous users.

Overall a massive net improvement in performance, but how can this be used?

Topics: Management News Intelligence Connectivity

Mobile World Congress – Day 1 it’s all about Intelligent Connectivity

imei is attending Mobile World Congress – MWC19 – in Barcelona to get the latest developments in mobile technologies and ecosystems directly from the world’s biggest mobile conference, where the talk of the conference is all about 5G.

Topics: Security Management News Connectivity

What you need to know about enterprise mobility TCO

In a very short space of time mobile has evolved from being another device for IT to support, to a new way of doing business. One that allows employees to do the same work they can do at their desk, from any location at any time. In the age of flexibility, employees are no longer shackled to their desks, but tethered to their mobile devices.

Topics: Security Management Lifecycle

5 reasons to outsource enterprise mobility management

In many organisations, the IT department is tasked with enterprise mobility management even though IT skills are not specifically required to manage a great many mobility tasks. Everything from creating a BYOD policy, to ordering and provisioning devices, to configuring smartphones, replacing lost or stolen devices, and managing data expenses is hardly the remit of computer science professionals.

Topics: Security Management Intelligence Lifecycle