Etheric Networks Selects VCTI to Optimize and Prioritize its Broadband Network Buildout Plan
VCTI s NOCPlan Enabling Etheric Networks to Deliver the Highest Level of Services to the Largest Number of Customers in Underserved Areas of California
News provided by
Share this article
VCTI, the broadband and network technology experts, today announced that Etheric Networks, the leading provider of wireless internet service in the California Bay Area, is leveraging VCTI s
NOCPlan™ to optimize and prioritize their broadband network build-out plans.
Etheric recently secured significant wins in the Federal Communications Commission s Rural Digital Opportunity Fund (RDOF) and Citizens Broadband Radio Service (CBRS) spectrum auctions, enabling them to expand their high-quality internet to California s rural areas. Etheric is leveraging NOCPlan s advanced automated algorithms to quickly determine the best broadband deployment options across fiber, fixed wireless, and hybrid archi
Dish, RS Access, others form 5G for 12GHz Coalition
lightreading.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from lightreading.com Daily Mail and Mail on Sunday newspapers.
Etheric Networks Selects VCTI to Optimize and Prioritize its Broadband Network Buildout Plan
prnewswire.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from prnewswire.com Daily Mail and Mail on Sunday newspapers.
In January, equipment vendor Ubiquiti told customers to reset their passwords due to a security breach involving a third-party cloud provider.
The announcement appeared to be a relatively routine security warning. Such alerts among equipment vendors have become increasingly common as the noise around cybersecurity continues to rise.
However, the situation took on added weight when security researcher Brian Krebs reported last month that the issue was in fact a catastrophic security breach, citing comments from a whistleblower involved in the situation.
According to Krebs, the hack penetrated Ubiquiti s servers in Amazon s cloud, giving the intruders remote access and full source code control. Such access could have allowed the intruders to remotely authenticate to countless Ubiquiti cloud-based devices around the world, he wrote.