You can try the Advanced Course Search.
Or you can call (Mon-Fri, 9-8 US Eastern) or email us (anytime).
Download Brochures, View Online Catalogs:
Brochures: Eogogics Brochure
Catalogs: Telecom, Engineering, Technical Management, Leadership / Soft Skills
Slide Shows: Eogogics Intro, Eogogics Classes Worldwide
Telecommunications
General
Light-based methods have been used for information transmission for thousands of years. Probably the earliest method is the fires that have been used for signaling since Biblical times.Smoke signals have been used for communications for a long time, most notably by Native Americans. Lanterns hung in Boston’s Old North Church (“One if by land, and two if by sea”) figure prominently in Paul Revere’s famous midnight ride in 1775.
Related Courses :
A spate of cyber-attacks, some of which were quite serious, have recently affected government agencies as well as businesses in a wide range of industries, including the CIA, US Senate, IMF, NATO, Google, Lockheed Martin, Sony, Citigroup, and others.
Related Courses :
The terms SDN (Software Defined Networks) and NFV (Network Functions Virtualization) have acquired magical connotations for those who work with networks but are not technical, raising many expectations. Are SDN and NFV really such a game changer for networking? SDN and NFV are among the half dozen or so technologies seeking to address the issues that trouble contemporary networks. The other major technologies in the mix include GMPLS, ASON, high-speed Ethernet, NGN, and OTN, with a good deal of overlap between the various solutions that have been proposed.
Related Courses :
Mobile cellular operators are making plans for Mobile Edge Computing (MEC), which enables Cloud computing capabilities and an IT service environment at the edge of the cellular network. It is a concept developed by ETSI (European Telecommunications Standards Institute) that aims to bring computational power into Mobile RAN (radio access network) to promote virtualization of software at the radio edge. MEC brings virtualized applications much closer to mobile users ensuring network flexibility, economy and scalability for improved user experience.
Related Courses :
Check out our courses on 5G Wireless technologies, applications, and marketplace along with related courses on M2M and IoT.
From the late 1700s to the early 1800s, the Japanese wood block artist Katsushika Hokusai created forty six wood block prints and, for reasons understood only by the artist, entitled the collection “Thirty Six Views of Fujiyama”.
Happy New Year! I hope last year was as productive for you as it was for us. In 2010, we introduced four new curricula (IEEE WCET, Spectrum Management, OSS/BSS, Manufacturing Optimization, Human Resources) and enhanced nearly all of our existing curricula, making our 400+ course curriculum one of the largest, most up-to-date
Introduction The Internet of Things (IOT) refers to the increasingly networked world we now inhabit, in which more and more “smart” devices use Internet to interact with other devices, servers, or with various users. It is not a new type of Internet, but an evolutionary development that shows how incremental technology growth can lead to…
Related Courses :
IP and Related
Blockchain, the Distributed Ledger Technology behind Bitcoin, has attracted interest across many industries including financial services, legal, real estate, digital rights, identity management, healthcare, asset tracking, supply chain management, and the Internet of Things (IoT). A disruptive technology, it has the potential to transform the way many transactions are conducted.
Related Courses :
Nearly every industry vertical stands to be transformed by the coming IoT revolution. The IoT technology is creating enormous opportunities for new services as well as more efficient delivery of existing services. The rapid pace at which this technology is evolving is also giving rise to major privacy/security risks for individuals, institutions, and public infrastructure — creating new vulnerabilities and giving rise to not-as-yet-thought-of attack modalities, including those of remotely engineered death and destruction.
Related Courses :
This is a web-based video recording of the 3-hour long course webcast live on Oct 22, 2009. It’s aimed at those who need a quick, “technical light” introduction to IPTV.
I really enjoy watching the TV show House. Not for Hugh Laurie’s award-winning sarcasm – which I find formulaic and annoying – but, rather, to watch the diagnostic process unfold. House is truly unique because the real star of the show might turn out to be leishmaniasis or schistosomiasis rather than Brad Pitt or George Clooney. I watch the team meetings and brainstorming with great interest, the whiteboard filling with symptoms, while the team postulates the cause.
The fad these days is make-overs. The first in the trend were fashion make-overs where some hideously unattractive and under dressed person was transformed, through the miracle of modern cosmetology and fashion science, to a hideously over-made up and over-dressed person.
It covers IoT, IPv6 implementation, TCP/IP, Mobile IP, IP Security, BGP, MPLS, and more.
Thursday, June 8th, 2011 was the Internet Society’s World IPv6 Day. Years from now will you remember where you were and what you were doing on this important day? While the events of World IPv6 Day are not etched as deeply into my memory as, say, the day Ronald Reagan was shot or the day…
At its most basic level, IoT just connects simple devices over the Internet or other network which could be private and/or wireless. Common examples include the ‘program-from-anywhere’ thermostats and security systems already in use. At the mid-level, IoT is an enabler of new business and technology models, not just incremental improvement of existing ones. For example, autonomous vehicles will require very high levels of communication among devices in the vehicle (e.g., LIDAR, sensors, cameras, computers) and most likely devices/sensors outside the vehicle (e.g., other vehicles, fixed cameras, servers with detailed maps). At the highest level, the interconnection of devices could lead, over time, to new technologies that will reorganize the society, much as the automobile and the Internet have. One possibility is the “Smart City”, where IoT is used not only in autonomous vehicles, but where all types of transportation are linked to provide optimized people movement. Private self-drive cars, in this scenario, would rarely be needed. This could lead to entirely different land use patterns, for example.
Related Courses :
NextGen Networks
Timothy Berners-Lee invented the browser and, subsequently, the World Wide Web. The impact of this browser thing of his is so profound that not only does it transform the way that everyone in the industrialized world interacts with each other, it inspired Her Royal Highness Queen Elizabeth – with but two taps of the royal sword – to transform Mr. Berners-Lee himself into Sir Timothy.
Related Courses :
This is a web-based video recording of the 1-hour long course webcast live on Oct 7, 2009. It’s aimed at those who need a quick, non-technical introduction to Next Generation Networks.
This is a web-based video recording of the 3-hour long course webcast live on Oct 21, 2009. It’s aimed at those who need a quick, “technical light” introduction to Next Generation Networks (NGN).
IMS
Communications networks are rapidly evolving into policy-based, packet-oriented networks designed to provide a particular quality-of-services (QoS) for subscribers while reducing the costs associated with capital expansions, network operations, and management. If you are involved with telecommunications planning, engineering, deployment, strategy, marketing, or services creation, it is critical that you understand the technology and business implications of IMS.
Related Courses :
Susie had been using Instant Messaging (IM) with her wireless carrier for eight months when she decided to add Push To Talk (PTT) as well. While she was quite happy with the first service, and had heard many good things about the second service from her friend, she was not at all satisfied with how the two services worked together—or rather didn’t work together.
VoIP
Anyone who has ever been engaged most certainly can list the four “Cs” of diamonds: Color, Clarity, Cut and Carat weight. But did you know that there are also three “Cs” of Voice over IP?
Related Courses :
Check out our multimedia curriculum for courses on IMS, SIP, VoIP, and EoIP.
If you plug VoIP into a search window, you are invariably led into a forest of technical specs — site after site of the latest in IP PBX’s, release 3.0 and 9.5’s, gateways, media servers, Internet Protocol, real-time protocol, and a yellow brick road with lions, tigers, and bears.
On the left side of the screen was Ken Lay being led off in hand cuffs. On the top was a quote from Mr. Lay: “But I told him to pass the books … not to pad them!”.
Related Courses :
VoIP, Voice over IP, stands for Voice over the Internet Protocol. In VoIP, voice calls are packetized to allow the voice traffic to “ride over” the organization’s data network. This eliminates the need for a separate voice network with its dedicated voice circuits, thereby saving resources and costs.
This 5-minute executive guide to VoIP presents a non-vendor perspective for decision-makers.
MPLS
By 2010 both ATM and FR were in fairly steep decline, relegated to the status of legacy technologies. MPLS usage is growing and new applications for it continue to emerge, making it the technology of choice for most large-scale networks. Nowadays the great buzzword is “cloud computing”, with different versions such as Software as a Service (SaaS—Gmail, Google maps, YouTube, Facebook), Platform as a Service (PaaS—Amazon Elastic Compute Cloud, Windows Azure, Salesforce). All of these utilize MPLS-based networks.
Related Courses :
This is a web-based video recording of the 6-hour long course webcast live on Oct 28-29, 2009. It’s aimed at those who wish to develop a deeper understanding of Multiprotocol Label Switching (MPLS), related issues, and the competition.
Related Courses :
SNMP
Do you know what the following have in common: television broadcast studios, automated fare collection systems, airborne military platforms, energy distribution systems, and emergency radio networks? It’s SNMP, a protocol designed to manage a diverse set of networked equipment.
Related Courses :
Simple Network Management Protocol (SNMP) is a widely used protocol designed to facilitate the management of networked devices from a central location. Designed originally for the management of devices such as routers and switches, its usage has grown rapidly to encompass the monitoring of nearly any electronic device one can think of.
Related Courses :
Mobile Wireless Backhaul
Mobile backhaul and wireless backhaul are two names for the same thing: the communications link between the practically ubiquitous cellular antennas on radio towers, buildings, highway signs, church steeples, fake Sequoyah trees and elsewhere that connect mobile subscribers to the carrier IP network and/or Internet.
Includes making a business case for backhaul, application case studies, market, technology deep-dive, and security
Mobile is hot and mobile backhaul is thriving. As the number of mobile devices grows the need to bridge the gap between the subscriber devices and the IP cloud grows and as the bandwidth demand increases the demand for a bigger bridge between the subscriber devices and the IP cloud also grows.
“I don’t follow any one mobile backhaul provider’s stock anymore, including my own – I just count the number of AT&T, Verizon and T-Mobile ads.” This comment was made by an admitted stock-a-holic who, it turns out, is a regional sales VP for a national backhaul provider.
Other Telecom
SDN and NFV have been developed to help meet the challenge of increasing demand for services and user expectation of rapid provisioning and universal availability. Both rely on virtualization, the ability to make a piece of equipment look like another via the magic of software. SDN was originally developed to address the problems of large data centers, where virtualization of hardware and operating system is important. It will likely spread to other areas, including the WAN, where virtualization and the ability to dial up bandwidth and related characteristics would be extremely valuable as well. NFV is an outgrowth of SDN in many respects, concentrating on backbone networks, where the need to rapidly reconfigure resources is key.
Related Courses :
As the name suggests, optical networks form a class of networks where optical, rather than electronic, components are the building blocks of the network. Compared to metallic cable, fiber optic systems offer greater bandwidths, lower attenuation, and no crosstalk or electrical interference.
Related Courses :
Signaling System #7 (SS7), also known as C7 in Europe, is a critical component of modern telecommunications systems. Despite the upcoming migration to IP networks and evolution to IP-centric architectures such as the IP Multimedia Subsystem (IMS), it remains the glue that binds all telecommunication networks together.
Related Courses :
Powered by the expansion of connectivity fueled by IPv6, the Internet is quickly morphing from a ‘network of computers’ into a ‘network of things’, and this technology is developing at a much faster pace than other such technologies of the past. Smart phones, cars, homes, buildings, wearable computing devices, unseen but ubiquitous sensors embedded into appliances, equipment and infrastructure, and many other “things” (including living things such as cattle and wildlife) are all getting linked up into a vast and pervasive Internet of Things (IoT)! It’s a disruptive technology that — though largely invisible to consumers — will have profound impact on our everyday lives, how businesses operate, and on the world economy as a whole (multi-trillion dollars) — all in as little as five to 10 years.
Nearly every industry vertical stands to be transformed by the coming IoT revolution. The IoT technology is creating enormous opportunities for new services as well as more efficient delivery of existing services. The rapid pace at which this technology is evolving is also giving rise to major privacy/security risks for individuals, institutions, and public infrastructure — creating new vulnerabilities and giving rise to not-as-yet-thought-of attack modalities, including those of remotely engineered death and destruction. Yet, many businesses and government agencies wonder if this is all passing hype — which it is not — and many do not know how the IoT should fit into their organizational strategy.
So is your organization positioned correctly to benefit from this coming Internet of Things (IoT) revolution? Starting with this issue of the Eogogics Quarterly, we will be publishing a series of articles, courses, and research publications to help our readers better understand the underlying technologies, business and societal impact, potential, and market landscape of the Internet of Things (IoT). Featured in this issue are an article on distributed computing for the IoT and an update on the new courses and research publications on IoT that have been recently added to our product line-up. Are there IoT issues you’re interested in that are not covered by our courses and research publications? Call us (+1 703 345-4375) or drop us a line at [email protected]. We may be able to help.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Error: Contact form not found.