TITLE

Fiber Fills Eagle's Wings

AUTHOR(S)
Stump, Matt
PUB. DATE
November 2004
SOURCE
Multichannel News;11/15/2004, Vol. 25 Issue 46, p35
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on developments in video, voice and data provider technologies offered by Eagle Broadband Inc. in the U.S., as of November 2004. Efforts of the company in financing a broadband network; Reasons behind its preference of bundled digital services, including voice and security; Capabilities of a set-top box product built by the company; Features of the standard video encryption used by the company.
ACCESSION #
15083272

 

Related Articles

  • Fiber Fills Eagle's Wings. Stump, Matt // Multichannel News;11/15/2004, Vol. 25 Issue 46, p35 

    Focuses on developments in video, voice and data provider technologies offered by Eagle Broadband Inc. in the U.S., as of November 2004. Efforts of the company in financing a broadband network; Reasons behind its preference of bundled digital services, including voice and security; Capabilities...

  • Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model. Zhu, Guobin; Xiong, Hu; Qin, Zhiguang // Wireless Personal Communications;Nov2014, Vol. 79 Issue 2, p1401 

    To achieve unforgeability and confidentiality simultaneously, signcryption has been introduced with better efficiency than the signature-then-encryption approach in terms of computational costs and communication overheads. Taking the key leakage into account, it is desirable to design...

  • Wi-Fi strengthens security.  // CED;Dec2002, Vol. 28 Issue 12, p16 

    Focuses on the security mechanism of Wi-Fi-certified products. Enhancement of data encryption in WI-FI Protected Access (WPA); Replacement of Wired Equivalent Privacy (WEP) by WPA; Availability of WEP-based gear.

  • Enhanced Diffusion Encryption for Video Transmission over Mobile WiMax Networks. Mohamed, M. A.; Zaki, F. W.; El-Mohandes, A. M. // International Journal of Computer Science Issues (IJCSI);Mar2013, Vol. 10 Issue 2, p213 

    As a promising broadband wireless technology, WiMax has many salient advantages over such as: high data rates, quality of service, scalability, security, and mobility. Many sophisticated authentication and encryption techniques have been embedded into WiMax but it still exposes to various...

  • Speed safely: Application-acceleration best practices. Newman, David // Network World;10/1/2007, Vol. 24 Issue 38, p34 

    The article presents the best practices for deploying wide area networks (WAN) application-acceleration devices. Some users consider defining their key goals as one of the practices to deploy application acceleration. Some of these users aim to reduce WAN bandwidth consumption and cut monthly...

  • Digital Rights Management in Archives. Stocker, Daniel; Kummer, Jean-Christophe; Rathammer, Andreas // IASA Journal;Jun2005, Issue 25, p31 

    The article presents information on the use of Digital Rights Management (DRM) in archives. It is important to save audio-visual archival materials from being misused, so there is a need for DRM. Watermarking is a technique that could be use to digitally preserve archives. An audio watermarking...

  • WCC, Eagle Broadband Partner For Emergency Management Communications.  // Satellite Today;3/28/2006, Vol. 5 Issue 57, p2 

    The article reports that Eagle Broadband Inc. announced that World Communication Center would distribute various models of Eagle Broadband's Satmax product line, including Eagle's Alpha Emergency Communications System, as of March 28, 2006. Eagle's current Satmax offering includes three models,...

  • Triple-Base Hybrid Joint Sparse Form and its Applications. Maitra, Subhashis; Sinha, Amitabha // International Journal of Computer Applications;Apr2012, Vol. 43, p9 

    Multi-scalar multiplication and multi-exponentiation are the major problems in digital signal processing(DSP) and in public-key cryptography. In DSP, multiplication of the filter coefficients, which is used in different signal processing algorithms, is a time consuming operation. Also in...

  • Format-Preserving Encryption for Character Data. Min Li; Zheli Liu; Jingwei Li; Chunfu Jia // Journal of Networks;Aug2012, Vol. 7 Issue 8, p1239 

    This paper presents FPE (Format-preserving Encryption) for character data in both fixed-width and variable-width encoding. Previous researches only studied FPE for fixed-width character data. In this paper, FPE for character data is categorized into NPE (Number-preserving Encryption) and LPE...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics