In this week's #TechTuesday with CTO Tom, he explains what LTE Advanced is and how all users will benefit. To learn more about LTE Advanced, which is a part of LTE Unlicensed, please visit: http://ctia.it/1Ji1jP1
Glenn Lurie, AT&T Mobility President and CEO, will be a Super Mobility 2015 keynote speaker. Lurie will discuss the future of the industry, IoT, security and what’s next in mobile.
Visit www.ctiasupermobility2015.com for more information.
You hear a lot about spectrum, but what is it exactly? And why is CTIA leading the charge to get more of it for wireless companies? In this week's #TechTuesday with CTO Tom, he explains what what spectrum is and why it's important to all Americans.
After the FCC released its blog post on the 600 MHz Incentive Auction, I said:
“We appreciate the FCC’s release of an updated roadmap on next steps in the development of the 600 MHz Incentive Auction. As the FCC finalizes its timeline for this first-of-its-kind auction, we urge the Commission to ...
More than 98 percent of Americans have access to 4G LTE, but what's next? In this week's Tech Tuesday with CTO Tom, he explains what 5G is, how it benefits consumers and what the wireless companies need so it becomes a reality.
Remote access to health monitoring and healthcare holds great potential value. Despite “healthy” regulatory hurdles, there are some exciting new products and services, and more ahead.
Check out the schedule and learn more by visiting our website. We'll see you September 9, 10 & 11 in Las Vegas!
From 5G & next gen networks to microcells, MBMS to security, the foundational fabric of wireless—present and future—will be on display and up for debate.
CTIA Super Mobility, the Western Hemisphere’s largest, most influential forum on mobile innovation, you’ll not only take advantage of features like targeted education, after-hours networking events, ...
CTIA Super Mobility 2015 has you covered for everything you need to know NOW about cybersecurity and privacy. In advanced security and privacy sessions, experts share up-to-the-minute knowledge on securing your system against breaches, building privacy protections into products and services, de-identifying data to protect subject privacy and ...