Blog Preparing Telecom for the Quantum-Safe Future: Why a Telecom-Specific CBOM Matters7/29/2025Reimagining Wireless Intelligence: A Foundation Model for the Physical Layer7/12/2025Beyond Chatbots: Why Telecom Needs a Cognitive Assistant for the 6G Era6/23/2025The Value of Verifiable Credentials in Telecom – Building a Framework for Trust1/28/2025Navigating the Quantum Leap: PQC Migration and What It Means for the ICT Industry8/22/2024Navigating Quantum Risks: The Imperative of Crypto Agility KPIs for Risk Managers1/31/2024How Self-Sovereign Identity Can Provide an Effective Defense Against SIM Swap Fraud7/13/2023In Anticipation of Metaverse Standardization3/7/2023It’s About Time – For a National Resilient Timing Architecture2/2/20236G Market Development: A North American Perspective10/6/2022Self-Sovereign Identity: The Next Step in Personal Privacy Protection1/20/2022Supply Chain Standards: The Key to Assured 5G Networks10/26/20215G Vertical Enablement Platform Sets the Path for New 5G Services4/14/2021Looking Back at WSTS 2021 — and Ahead to the 5G Future4/8/2021ATIS Next G Alliance Sets Direction for North America Leadership in Mobile Technology Evolution – 6G and Beyond12/3/2020State of the Market: 5G Standardization11/3/2020Enhancing IoT Security Through Distributed Ledger Technology9/9/2020The Other 40% of the Network: ATIS Addresses TDM Network Call Authentication8/15/20205G Evolution – The Next Phase7/31/2020The Toolkit Approach to Building All IoT Solutions7/8/2020DNS Security4/23/2020IOT Categorization: Exploring the Need for Standardizing Additional Network Slices1/3/2020Collaborative Cybersecurity for Connected Vehicles12/3/2019Building an Economic Development Tool for Smart Communities8/16/2019Do You Know What’s in Your Network? A Process-Driven Assessment of the Cybersecurity Risks that IoT Products and Services Present8/8/2019Wireless Emergency Alerts5/16/20195G is on the Horizon. What Will It Take to Accelerate the Development of the Network of Networks2/12/2019UAVs for Restoring Communications in Emergency Situations1/31/2019Context-Aware Identity Management: The Who, What, Where, When and How11/27/2018The Role of Artificial Intelligence in Telecom9/19/2018Understanding the Value of Distributed Ledger/Blockchain Innovation in the ICT Industry8/13/2018What the Haul?5/21/2018Subscriptionless Devices Offer Potential Revenue Opportunity for Network Operators5/16/2018Innovations in 5G Core2/22/2018oneM2M’s Value Proposition for IoT Application Developers11/28/2017Putting the oneM2M Standard into Action: ATIS OS-IoT Software11/17/2017Joining Forces to Make the FCC’s Robocalling Initiative a Reality10/24/2017Why Time May Not Be on Your Side9/26/2017Securing the Connected Vehicle: Why a Collaborative Approach is Critical for Success8/22/2017App-ID Registry: Securing the Internet of Things (IoT)7/17/2017A Smart Approach to Planning Smart Cities5/9/2017The Evolution to Content Optimized Networks Initiative: Path to a Future Network2/22/201714 Expert Presentations on Timing and Sync Issues in Financial Markets2/7/2017Better Wireless Coverage in Public Spaces, Advancing the 5G Future — ATIS’ Neutral Host Solution1/11/2017Robocalling and Caller ID Spoofing – Detect, Mitigate and Deter12/15/2016