Tag Archives: Universitas Lampung

Student of Telecomunication Engineering University of Lampung do Visiting Study and Short Research in the Czech Republic


(Unila): “visit of Lampung University students to partner universities abroad, either for study, research, seminars, and other scientific activities are very important for the internationalization of the institution University of Lampung,” said Vice Rector presented the University of Lampung (Unila ) Prof. Dr Ir. Hasriadi Mat Akin, M.P. in his office when removing the departure of two students Unila, Friday (1/3).

IEEE ComSoc CTN Special Issue on Ten Trends that Tell Where Communication Technologies are Headed in 2015

CTN Issue: January 2015

By Elena M. Neira – Director of Online Content, IEEE ComSoc Board of Governors

TeknologiJanuary 2015 – @elenaneira

As we enter the 15th year of the twenty first century, what are the emerging communications technologies that will be hitting the news headlines, and what trends will be at the top of research and development agendas in industry and academia. Here’s ComSoc IEEECTN list of the top ten technologies worth watching, including possible twists on the horizon for 2015 and beyond. Topics include 5G, cybersecurity, green communications, virtualization, cognitive networks, IoT, smartphones and connected devices, molecular communications, NetNeutrality, Internet governance and fiber everywhere.

How to Build a Safer Internet of Things


The Internet of Things (IoT) has been touted as many things. But what you haven’t heard is that it could be your worst enemy. Yet all of these incidents have actually occurred, according to news reports. But actually there are a few things you can do to protect your connected gadgets. If you are on a personal computer or mobile device, make sure that any available firewall and antivirus software is activated and up-to-date. Make sure you scan your system regularly to identify and remove any malware or possible intrusions. A computer infected with malware or breached by a hacker can be a launching point for attacks against the IoT equipment in your home, or it may store passwords for IoT products that the hacker can use.