Please enter keyword
Please enter keyword
Do you want to exit?

GTI 5G+Proximity Network Architecture Based on D... 19 th / 10 / 2022

This white paper introduces the digital twin-oriented 5G+ proximity network architecture, and gives the future 5G+ proximity network technology evolution direction and application prospects based on market, industry, technical requirements, etc., which may promote the digital and intelligent transformation of vertical industries.

GTI Computing Force Network Service Security Whi... 7 th / 9 / 2022

Based on the service operation mechanism of the computing force network, this white paper comprehensively analyzes the security risks and gives the security strategies in the four stages of user access, computing network arrangement, task execution and transaction settlement, so as to guide the industry to improve the security ability of computing network service.

GTI Classification of Malicious Links for Vertic... 26 th / 8 / 2022

This white paper aims to unify the malicious links classification framework and standardize the type and name of malicious links. This is conducive to the design, development, construction and evaluation of the malicious links monitoring system. At the same time, it provides basic support for different vendors to realize information sharing and exchange. It also provides strong support for Internet governance.

NGMN-GTI joint release of “Definition of the Tes... 11 th / 3 / 2022

Recently, the first deliverable of NGMN-GTI joint project "Network Slicing for Operating Systems of 5G Smart Phones Phase 2" was officially released.

GTI unveils the joint “2.3GHz Band Industry Stat... 11 th / 10 / 2021

As 5G approaches, it will unleash the limitless possibilities and enable more exciting services and applications in our society. Therefore, GTI together with ...

GTI Built-in Security for Telecommunication Netw... 1 st / 9 / 2021

Based on current 5G network security statusrequirements from telecom operators, this white paper provides an overview of the goalsthe architecture of 5G endogenous security, its capabilitieskey requirements. Conclusions are made to telecom operatorsequipment vendors on effective collaboration to promote the developmentadoption of 5G endogenous security.

1 3 45 6 7 70 Go