Connect with us

Tech

AT&T unveils Open RAN call milestone | Computer Weekly

Published

on

AT&T unveils Open RAN call milestone | Computer Weekly


AT&T has announced it has completed its first Open RAN call using third-party radios over its commercial network.

AT&T first revealed its plan to modernise its wireless network almost two years ago, as part of a $14bn deal with Ericsson, described at the time as “industry-defining” and marking a “pivotal milestone” for the Open RAN industry.

Under the terms of the deal, the Swedish comms tech company agreed to build a 5G network platform for AT&T, deploying a range of its 5G Open Radio Access Networks products and supporting the US operator’s nationwide Open RAN ambitions.

The deal is centred on creating an open programmable network that will enable AT&T to accelerate the commercial introduction of Open RAN equipment and open network management services from multiple suppliers, using purpose-built hardware and virtualised commercial off-the-shelf (COTS) hardware.

The collaboration also sees the operator using cloud-native technologies built on O-RAN standardised interfaces – with what Ericsson said will have industry scale, cost efficiency, sustainability and high-performance top of mind. Over time, AT&T and Ericsson will transform this to a cloud-native open network.

The Ericsson offerings include massive MIMO and remote radios that are hardware-ready for the next generation of open fronthaul technologies. These radios are designed to lead to lower total cost of ownership (TCO) through their reduced weight, size and power consumption.

AT&T has just announced that to date, it has already completed nearly 40% of the overall swap programme from Nokia radios to Ericsson, and that it has added mid-band (N77) spectrum to over 15,000 sites, which it says deliver increased speeds and a “greatly improved” wireless experience for its customers. The programme was completed in collaboration with Ericsson and Fujitsu subsidiary 1Finity.

In August 2025, AT&T announced the successful completion of the first Open RAN call using third-party radios at its Labs facility, also in collaboration with Ericsson and 1Finity, and has now made the first Open RAN call using third-party radios over its commercial network.

AT&T described the move as a testament to the hard work and dedication of its teams. It stressed that the achievement was not just a technical milestone, but instead a clear signal that the future of wireless will be open, agile and innovation-driven.

Furthermore, it noted that the multi-vendor offering demonstrated the interoperability and flexibility Open RAN brings to its network, underscoring the critical role of collaboration in developing open and programmable networks that can transform the industry.

“Open RAN is more than a technology shift – it’s a catalyst for innovation and collaboration across the industry,” added Patrik Eriksson, vice-president and head of the mobile system business unit at 1Finity. “By proving multi-vendor interoperability on AT&T’s commercial network, we’re not just advancing technology – we’re shaping an ecosystem that will accelerate innovation for our customers and the entire industry.

“This is a significant milestone for the industrialisation of Open RAN, with the 1Finity radio operating with fully commercialised Ericsson software in the AT&T Network,” said Paul Challoner, vice-president and chief technology officer of the customer unit for AT&T at Ericsson.

“The 1Finity radios are integrated into Ericsson’s Intelligent Automation Platform, its Open RAN management and automation platform, which enables multi-vendor radio support. It is a great proof point for Open RAN ecosystem collaboration.”



Source link

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech

Iranian Hackers Breached Kash Patel’s Email—but Not the FBI’s

Published

on

Iranian Hackers Breached Kash Patel’s Email—but Not the FBI’s


Handala’s second claim, however—that it hacked the FBI—seems, for now, to be fiction. All evidence points to Handala having breached Patel’s older, personal Gmail account. Widely believed to be a “hacktivist” front for Iran’s intelligence agency the MOIS, Handala suggested on its website that the emails contained classified information, but the messages initially reviewed by WIRED didn’t appear to be related to any government work. TechCrunch did find, however, that Patel appears to have forwarded some emails from his Justice Department email account to his Gmail account in 2014.

Handala, which cybersecurity experts have described to WIRED as an “opportunistic” hacker group whose cyberattacks and breaches are often calculated more for their propaganda value than their tactical impacts, has nonetheless made the most of Patel’s embarrassing breach. “To the whole world, we declare: the FBI is just a name, and behind this name, there is no real security,” the group wrote in its statement. “If your director can be compromised this easily, what do you expect from your lower-level employees?”

Handala Hackers Put $50 Million Bounty on Trump and Netanyahu’s Heads

For further evidence of Handala’s bombastic rhetoric, look no further than another post on its website earlier this week (we’re intentionally not linking to it) that offered a $50 million bounty to anyone who could “eliminate” US president Donald Trump and Israeli prime minister Benjamin Netanyahu. “This substantial prize will be awarded, directly and securely, to any individual or group bold enough to show true action against tyranny,” the hackers’ statement read, along with an invitation to any would-be assassins to reach out via the encrypted messaging app Session. “All our communication and payment channels utilize the latest encryption and anonymization technologies, your safety and confidentiality are fully guaranteed.”

That bounty, Handala explained, was posted in answer to a statement about Handala published on the US Department of Justice website last week that offered $10 million for information leading to the identity or location of anyone who carries out “malicious cyber activities against US critical infrastructure” on behalf of a foreign government.

“Our message is clear: If you truly have the will and the power, come and find us!” Handala wrote in its response. “We fear no challenge and are prepared to respond to every attack with even greater force.”

In yet another post on its website this week, Handala also claimed to have doxed 28 engineers at military contractor Lockheed Martin working in Israel and threatened them with personal harm if they didn’t leave the country within 48 hours. When WIRED tried calling the phone numbers included in Handala’s leaked data, however, most of them didn’t work.

Apple says no device with its Lockdown Mode security feature enabled has ever been successfully compromised by mercenary spyware in the nearly four years since its launch. Amnesty International’s security lab head, Donncha Ó Cearbhaill, also says his team has seen no evidence of a successful attack against a Lockdown Mode–enabled iPhone. And Citizen Lab, which has documented several successful spyware attacks against iPhones, says none involve a Lockdown Mode bypass, while in two cases its researchers found the feature actively blocked attacks against NSO Group’s Pegasus and Intellexa’s Predator. Google researchers, meanwhile, found one spyware strain that simply abandons infection attempts when it detects the feature is enabled.

Lockdown Mode works by disabling commonly exploited iPhone features, such as most message attachment types and features like links and link previews. Incoming FaceTime calls are blocked unless the user has previously called that person within the past 30 days. When the iPhone is locked, it blocks connections with computers and accessories. The device will not automatically join nonsecure Wi-Fi networks, and 2G and 3G support is disabled. Apple has also doubled bounties for researchers who detect any Lockdown Mode bypass, with payouts up to $2 million.



Source link

Continue Reading

Tech

This Premium Sennheiser Soundbar Is $1,000 Off

Published

on

This Premium Sennheiser Soundbar Is ,000 Off


Looking for an all-in-one soundbar that sounds as big as it looks? Sennheiser’s Ambeo Max uses its oversized body to produce beefy, enveloping sound, and right now you can grab it for just $2,000 at Best Buy, a sizable $1,000 markdown from the usual list price. It’s one of our favorite standalone premium soundbars, particularly if you don’t want to deal with an exterior subwoofer but still want bigger bass than you’re likely to find on smaller options.

While it might be a bit larger than your average soundbar, Sennheiser uses the space well, packing a ton of functionality and drivers into the less-than-compact body. There are both full-range and 1-inch tweeters combined in every conceivable direction, and the result is an impressive reproduction of true spatial audio, something few other standalone bars can claim. As a result, it also has an impressive low-end, with bass that doesn’t rival dedicated subwoofers, but comes really close for how much simpler the setup process will be.

The larger footprint also allows for a huge number of inputs, more than you’re likely to find on those tiny soundbars that slide under your screen. In addition to an HDMI 2.1 output with eARC, you’ll get three HDMI inputs with 4K pass-through at 60Hz, USB, Ethernet, and optical audio. There are even RCA ports in case you want to hook this up to your turntable. There’s also a dedicated subwoofer output, in case you decide you want to add one to your setup down the road, giving you a ton of options should you decide to put the Ambeo Max at the center of your home audio setup.

Ready to make the move to a bigger, better soundbar? Swing on over to Best Buy to grab this hefty discount on the Sennheiser Ambeo Max, or check out our guide to the best premium soundbars for some of our other favorite picks. If you’re just out looking for a great deal in general, the Amazon Big Spring Sale is underway, and we’ve got a dedicated post with all the best discounts on everything from smartwatches to water bottles.



Source link

Continue Reading

Tech

ICE Agents Frustrate Airport Workers as Shutdown Drags On

Published

on

ICE Agents Frustrate Airport Workers as Shutdown Drags On


On Thursday, hours-long security lines snaked through New York City’s LaGuardia Airport. The wait was far from the longest in the country—George Bush International Airport in Houston reported three and a half hour lines. Over a month into a partial government shutdown that has left some Department of Homeland Security (DHS) employees working without pay, Transportation Security Administration (TSA) agents are calling in sick or leaving work en masse, leading to travel chaos around the US. The Trump administration’s solution? Send Immigration and Customs Enforcement (ICE) agents in.

ICE agents were deployed to at least 14 airports on Monday, ostensibly in an effort to speed up security lines—and five days into ICE’s incursion, airport employees are infuriated. The ICE agents, Transportation Security Officers (TSOs) who work for the TSA tell WIRED, don’t have the proper certification and training to perform many of tasks that might truly speed up security lines. The TSA employees say they’re frustrated by the situation—and worried about what it might mean for their future.

ICE agents have been spotted walking in packs, patrolling security lines and baggage areas. They have been seen giving directions to lost passengers, photographed distributing mini water bottles to those waiting in line, and, more often than not, standing around and appearing to do very little. “ICE are here and they’re doing literally nothing to help,” passengers in a security line overheard one airline worker complain on Wednesday at John F. Kennedy airport in New York.

The Atlanta Journal-Constitution reported that some passengers stuck in line spotted ICE agents being trained to check passenger IDs and boarding passes. In a hearing in front of the US House Committee on Homeland Security on Wednesday, TSA acting head Ha Nguyen McNeill said that “the travel document checker function is one of the nonspecialized screen functions of the TSA,” and said ICE agents are being trained to conduct checks.

TSOs say ICE’s presence is frustrating to those working without pay—especially because ICE agents are being paid. “If you want to bring a tactical force into an environment where it’s required to have customer service and a mindset where you know what you’re doing, how to identify something that might be suspicious—they don’t have that training,” says Hydrick Thomas, a security officer and the president of AFGE Local 2222, which covers New York and New Jersey airports.

Security officers say they’re concerned for their coworkers, who, thanks to last fall’s government shutdown, haven’t received a steady paycheck for half of the fiscal year. Agents are worried about paying for rent, mortgages, gas, and childcare. Food banks have stood up drives in several airports, including those in Houston, North Carolina, and San Diego. In Knoxville, Tennessee, airport authorities are accepting donations for employees at a Delta Airlines counter. Eleven percent of airport checkpoint employees called out on Tuesday, compared to four percent pre-shutdown, a federal official testified to Congress on Wednesday morning. Some airports, including those in Houston, Atlanta, New Orleans, and New York’s John F. Kennedy, have seen daily callout rates higher than 35 percent. More than 480 TSA screeners have quit since the shutdown began in February, the agency says.

Long term, security officers say they’re concerned that the federal government plans to replace them with other federal agents, including ICE agents, or private sector employees. One mentioned Project 2025, a blueprint for the second Trump administration published by the conservative Heritage Foundation, which advocates for privatizing TSA altogether.

“A part of the American dream that I was sold was that working for the government was honorable and stable,” Carlos Rodriguez, a security officer and a AFGE TSA Council 100 vice president representing airports Northeastern airports from New Jersey to Vermont. “But this is not honorable or stable at this moment.”



Source link

Continue Reading

Trending