Greetings from the Boston Software-Defined Radio User Group (SDR-Boston)! Here is your June 2015 edition of the Emissions monthly e-newsletter, which summarizes some the latest developments in software-defined radio technology from the New England area and around the world. If you have something to share with the rest of the SDR-Boston community, please drop us an email via firstname.lastname@example.org.
Register for VTC 2015-Fall!
The 82nd IEEE Vehicular Technology Conference (IEEE VTC 2015 Fall), the premier conference on wireless, mobile, and vehicular technology, is coming to Boston during 6-9 September 2015! Want to be part of this exciting event? Register now via the following link!
SDR News from Around the World
The case for more wireless spectrum
Smartphones have become such an integral part of our lives that the scientific diagnosis “nomophobia” was established to describe the fear of being without it. In just the past few years, we’ve watched as industries from health care to transportation to entertainment have transformed in the palm of our hands. Most Americans have the technology to watch streaming video on their phone while sitting in the backseat of an Uber car that they have ordered and paid for through their mobile device. Yet few are aware of the looming danger that threatens to stifle innovation and degrade the quality of current services: the dire need for a resource that is a critical part of our economic future. Find out more by clicking here.
Pelosi says it’s immoral that millions of kids can’t access digital learning
The Minority Leader, along with President Obama, bemoaned the lack of infrastructure that they said could help both cities and students. Find out more by clicking here.
Data Link Solutions Awarded $478.6 Million Contract for Production of MIDS JTRS Terminals
Data Link Solutions (DLS), a joint venture between BAE Systems and Rockwell Collins, has been awarded a maximum potential $478.6 million indefinite-delivery/indefinite-quantity contract from the Space and Naval Warfare Systems Command (SPAWAR) for the production, development and sustainment of Multifunctional Information Distribution System Joint Tactical Radio Systems (MIDS JTRS) terminals. Find out more by clicking here.
Amazon’s Misener urges US to develop rules for drones operating “beyond visual line of sight”
Paul Misener, Vice President for Global Public Policy at Amazon, will be giving testimony at a US Congress Committee on Oversight and Government Reform hearing today – and he is expected to argue that “the United States should immediately begin to plan and develop rules for small unmanned aerial systems operations that would encompass highly automated flight, beyond visual line of sight”. Find out more by clicking here.
Programmable Devices Help Push Full Cognitive Radio
The challenges of scanning across a wide range of frequencies, detecting activity levels, and rapidly switching frequencies are addressed by the latest programmable logic and wireless devices. Find out more by clicking here.
Musk vs Branson Satellite Internet “Space Race”
The first “space race” of the 21st century is on. Only this time it’s not the U.S. versus Russia, it’s Musk versus Branson. Elon Musk versus Richard Branson, that is, as Musk’s SpaceX and Branson’s (together with partner Greg Wyler) OneWeb compete to be the first commercial firm to offer low-latency satellite internet service. Find out more by clicking here.
This Radio Bug Can Steal Laptop Crypto Keys, Fits Inside a Pita
The list of paranoia-inducing threats to your computer’s security grows daily: Keyloggers, trojans, infected USB sticks, ransomware…and now the rogue falafel sandwich. Researchers at Tel Aviv University and Israel’s Technion research institute have developed a new palm-sized device that can wirelessly steal data from a nearby laptop based on the radio waves leaked by its processor’s power use. Their spy bug, built for less than $300, is designed to allow anyone to “listen” to the accidental radio emanations of a computer’s electronics from 19 inches away and derive the user’s secret decryption keys, enabling the attacker to read their encrypted communications. Find out more by clicking here.
Having trouble reading this e-newsletter, check out the online version here.