One, Two, Three, Four, Five G

One, Two, Three, Four, Five G

Even before the lockdown, people were interacting more over the internet than face-to-face. This has been with friends & family through social media, conducting business meetings & even virtual conferencing. Then you have online dating.

Not so many businesses are suffering especially those with visionary leadership. I remember a client I did some work for, who were totally paperless throughout. Besides, printed information can be really expensive & affect the environment adversely plus, very hard to keep current.

Schools today with tech-savvy teachers/students & commercial enterprises rely on the internet now for most of their information. The lockdown of course has restricted people from going to movie theatres & concerts, but even back then, those same people would have figured out about movies & music from the internet. Today's generation & some of the older ones, watch & listen to video & music, purchase tickets or download goodies on the internet. A huge amount of all shopping also is now done via the internet, with even advance orders for groceries online now. People can save travel time & money, can compare prices, see what is in stock & then visit a store. Internet connectivity & functionality is no longer an option in business, education, or everyday life; it’s absolutely essential.

5G is the next step. Which made the recent push backs regarding 5G deployment all the more remarkable. The US only raised security concerns over Beijing’s potential influence over Huawei as did Germany. The UK said that Huawei would be allowed access to the periphery of 5G mobile networks, but not the core.

Some other less developed nations are resisting the technology as a whole, not the Huawei product and it is a right down crying shame. I guess not everyone is able to count to 5.

https://www.vanguardngr.com/2020/05/senate-asks-fg-to-suspend-deployment-of-5g-network-in-nigeria/

要查看或添加评论,请登录

Roy Biakpara的更多文章

  • Beyond the Perimeter: Embracing Zero-Trust in the Age of Privacy

    Beyond the Perimeter: Embracing Zero-Trust in the Age of Privacy

    In today's complex cybersecurity landscape, traditional perimeter-based security measures are no longer enough to keep…

  • Managing Privacy Risks In Health Apps

    Managing Privacy Risks In Health Apps

    Health apps have revolutionised the way we access and manage our health-related information. Although data privacy is a…

  • Virus Parallels in Nature and Computers

    Virus Parallels in Nature and Computers

    Computer viruses may be a nuisance most times, but they can be dangerous enough to take down large systems, whole…

  • Unbundling Antitrust

    Unbundling Antitrust

    Software companies justify the high cost of their products by citing the heavy losses they incur from unauthorised…

  • Go with the flow

    Go with the flow

    For information security to align with the business, many a CISO have to placate the power wielding executives or find…

  • For the Robot in All of US

    For the Robot in All of US

    Can a machine ever be considered intelligent? If it can store data, sort, remember & retrieve information, learn to…

  • Tracking the Insider

    Tracking the Insider

    Network protections & the best security technology can be very costly. However, the greatest threat of all, the insider…

  • Cracking The INTELLIGENCE Code

    Cracking The INTELLIGENCE Code

    Intelligence is defined as "the collection of information of military or political value." Britain has a number of…

  • THOUGHTS AND BOTS

    THOUGHTS AND BOTS

    Technological advancement in general & military technologies in particular, affect government policy decisions in terms…

  • A Mother Like You

    A Mother Like You

    Do you remember the funny times we had? You always made me feel really glad I feel cheerful when I think of what we’ve…

社区洞察

其他会员也浏览了