Eagle-Lanner tech blog

 

A multiprocessing architecture called Non-Uniform Memory Access (NUMA) was introduced that simplified the complexity of the bus by configuring clusters and allow microprocessors to share memory locally, thus improving performance and expandability of the system.

Smart rail solutions have propelled urban rail and metro networks into the digital age, and uninterrupted connectivity is becoming especially essential for the public transportation sector. Reliable train-to-ground communication is required for efficient on-board operations and many on-board applications, which also continues to increase.  

Smart city projects can integrate a wide number of newly available endpoints from IoT, IIoT, sensors, video cameras, monitors, or actuators at the network edge or branch office, and collect a massive amount of rich data. But what is the value of this data, if it can’t be transported when needed?

As more and more businesses embrace cloud computing technology, and migrate to the cloud, there remain concerns around privacy and data security. Data is encrypted when it’s at rest or in transit, but applications need access to data in an unencrypted form while it is processing. Confidential computing aims to eliminate this data security vulnerability by protecting data while it’s in use.

It was around the 1990s that Machine Vision (MV) started to become a practical reality in the industry, especially within manufacturing environments. The advancements in other indirect technologies, from enhanced lighting, intelligent imaging systems, sensing, control, and especially computing, have helped MV systems transform into a practical reality.

Before and during the terrorist attacks from September 11, 2001, the first responders relied only on commercial and radio networks. At the time of the 9/11 crisis, these commercial networks were overwhelmed. And although agencies could communicate with their radios, they couldn’t operate across agencies. Police couldn't talk with EMS and firefighters, and vice-versa.

What NFV aims at is the same for CSPs: to virtualize the network services/functions performed by proprietary hardware platforms and converge them into a centralized software version running on a commercial off-the-shelf (COTS)-based hardware. The benefits are clearly discernible:  reduction on CapEx and OpEX, agility in functionality, flexibility in service creation, operation automation, dynamic scalability, and market acceleration.

페이지 13 / 전체 33