Blog

Mr Ren Zhengfei handing Professor Erdal Arikan an award

Huawei founder and CEO Ren Zhengfei presents the “Father of Polar Code” with an award.

It’s back to technology for Huawei as they presented Professor Erdal Arikan with an award recognising his achievements as “Father of Polar Code”.

Out with the random American claims and Trump’s trade war and tariffs; closing in on Apple, in the realm of smartphones is already history (that was last week’s news). Today, Huawei have presented Professor Arikan with an award recognizing his amazing contribution to the technology behind correct data transfers for 5G.

Since we are talking serious technology here, “polar” will have nothing to do with funny penguins or cuddly (while still potentially deadly) bears. We are entering a realm of data and coding which, while not open to all, can (and will) impact us all as users of technology.

 

What are we talking about?

 

Let’s look back to 1948. The father of information theory, Claude Shannon, determined a limit for the speed at which we can transmit data, error-free. The faster you send data, the more errors you might have. For anybody out there, try to picture yourself doing any task a lot faster than you should…. You usually miss a step or lose something along the way.

In 2008, Professor Arikan invented polar codes, which were an entirely new approach to correcting transmission errors.

Polar coding was believed to be the first coding scheme to approach channel capacity as defined by Claude Shannon with a theoretically proven guarantee and resolved the challenge that had plagued the field of information theory for nearly 60 years.

Starting in 2010, Huawei began working with Dr. Arikan to take polar codes from theory to practical application. Now polar codes are a 5G standard (decided by 3GPP).

And polar codes bring us right up to the edge of Shannon’s limit.

 

Why does it matter?

 

In a word, 5G.

Basic research is key to industry development. Theoretical breakthroughs, often made after decades of focused scientific effort, help set the direction of technological progress. LDPC codes (which are used to correct errors during information transfer) were first introduced by US professor Robert Gallager in 1963. Decades later in 2008, a Turkish professor at Bilkent University, Erdan Arikan, proposed an improvement to LDPCs known as polar codes.

5G will support 100 billion connected cellular devices, a number much larger than what a 2G, 3G, or 4G network can support. With a larger market, holders of 5G standard-essential patents are able to get reasonable returns from their R&D investment.

 

What is Huawei’s contribution?

 

Huawei is presenting an award to Professor Arikan in “recognition of his work as an outstanding scientist, and in tribute to his practical spirit and dedication”.

Turkish professor Dr. Erdal Arikan, from Bilkent University, visited Huawei’s global headquarters in Shenzhen yesterday and met with Huawei founder Ren Zhengfei.

Quite importantly, in the current environment, Huawei reiterated, on this occasion, that they follow the “FRAND” principle for 5G standard-essential patents.

Huawei is a major 5G standards contributor and patent holder which gives them a leading position on the worldwide stage. They have, however, committed to following the FRAND principle – Fair, Reasonable, and Non-discriminatory – “as they have always done in the past”.

The future of 5G will be with Huawei or not be. From an external observer point of view, one can but notice that the discourse has not changed. For the past few years, through the growth stages and through adversity, Huawei tends to stick to the principles of Mr Ren and work towards bettering the world through collaboration.

And recognizing others’ contribution. Here is to you, Professor Arikan!

 

Disclaimer-

As a KOL (Key Opinion Leader) for Huawei, I can be invited to take part in various corporate events both produced by Huawei, as well as any other corporation. While Huawei, partners or other corporations may cover my travel expenses to these events, I’m not a paid spokesperson for Huawei or any other company; as such, nothing I say or write about is in any way required, nor forced by Huawei. My opinions whether related to products or companies, both positive and negative, are mine; and mine alone.

Photo of monkey biting a vegetable

Social media and marketing bites

Social media, as bite-sized takes. Here are some of my little pieces of smarts on some of the current topics.

 

Employee advocacy has always been important but it is growing in importance with the development of social selling

 

One mistake to avoid: encourage employee advocacy but do not “force” it on employees #influencerchat

 

Personalized social media marketing

 

Personalisation starts with structure. Know where you stand, what the key messages are, who the audiences are, etc. Then adapt with different takes.

It has become crucial to talk to people individually, not only for thesake of humanity, but also social selling and advocacy.

 

Expiring content

 

Use expiring for black ops! As in guerilla marketing or limited offers. Create urgency and strong response from audience

 

Organic traffic is becoming harder

 

Look into it and learn. Use data and updates to SEO systems to help you see what works and stands out. But start with great content.

 

The benefit of social media data

 

You don’t steer a ship without tools and directions. You don’t steer a social media vessel (& strategy) without these either.

 

Emojis

 

The interesting feature of emojis, beyond language, is that it adds “color” to a tweet. It makes it stand out more than text.

We love everything visual. And emoji have a playful feel to them too that attracts the eye.

 

Live  streaming / video

 

Video makes content more appealing to audiences. It is visual, easy to consume and often more human.

 

One final focus

 

Ensure having a platform to aggregate all contents from social media and make it searchable / referenced for reach.

Lessons for building a solid startup

Building a startup is not easy. Keeping it alive even less. From the moment an entrepreneur makes the decision to start a business, it is crucial that they follow the right steps in order not to waste a commendable initial effort. In this post, I want to point out six important things about building a startup:

Pitching

Pitching a business does not come naturally. In the context of the bootcamp, a startup has to convey what their business is about but also convince someone to vote for them or simply agree it’s a great idea. And that is within five minutes or less and an ever-changing panel of judges. You must be able state the problem you are solving in a sentence, and how you are going to make money with your solution within a few more. It’s a good skill for convincing almost anyone of anything!

Having a solid team

We welcomed some single founders and some teams. While we do recommend having a mix of skills (hence a team), what matters and helped individuals and teams over the weekend was the ability to not lose their nerves, to be able to change their game quickly and to keep their focus.

Networking and interacting

Getting into the startup game is not only about business but also about connections. You will – and must – meet all kinds of people. These are people that could be your next co-founder, or investors or just the random person who will see the glitch in your rocket ship idea.

Things happen when you turn up and participate. And you never know just what that might be.

Overcoming crisis

Our bootcamp is both a competition and a learning experience. In both cases, the feedback will be honest, aiming to help but also, sometimes brutal.

If you have truly done the background work, and taken your idea through some good validation processes then take it with a pinch of salt. Otherwise, do not despair and take feedback for what it is too, advice from smart people and fellow entrepreneurs.

Crisis of confidence are one of the most common reasons businesses fail. Do not doubt yourself, make it happen!

Tech is not everything

People, entrepreneurs or not, often need a reminder that technology does not make a product. A need in a sizeable market may. And potential customers in that niche who would be ready to pay for your product will. Success on the market comes from relieving a (real) pain point, that many people have, with a solution that, also, makes good financial sense.

Experience has value

Experience is another pitfall of startups. There is also a reason why 40+ is the age of the most successful startup founders… experience (and networks). We try to bring a mix of experience to startups taking part in the bootcamp as well as highly-skilled enthusiasm in order to add value all along.

Server room

Web Application Security Tips

Your website may be fortified against hackers and other security threats, but even the strongest walls have vulnerabilities that can be exploited by those with the knowledge and motivation to break into them. That’s why it’s crucial for businesses to understand the threats that exist for web applications and some of the most vital techniques and tips for fighting them. This is especially critical for smaller businesses, which may not have the time to think about protecting their web applications from attacks. Because a cyberattack can be devastating for any business, web application security should be at the top of every company’s priority list.

There are numerous ways hackers and other types of cybercriminals can exploit weaknesses in web applications. These cyberattacks can include denial of service, which puts a web application out of commission; exfiltration, which involves the loss of customers’ sensitive information; or code injection, which can lead to a hacker gaining complete control over an application. In every situation, these types of cyberattacks can lead to serious consequences for a small business, including but not limited to lost business and lost trust from customers. Small businesses that want to avoid these catastrophic situations must understand the threats and how to combat them.

For example, an insecure direct object reference attack involves an authorized user changing a parameter value to access a resource he or she should not have been able to access. Malicious users can exploit this type of attack to steal or abuse data and functionality that they should not have been permitted to use. Protecting your small business from these types of attacks can involve using drop-down menus to limit users to a list of authorized resources. Because, it eliminates the possibility of users changing parameter values. This can be highly effective in preventing this particular type of attack.

The following guide contains information about many of the most common types of web application attacks and how small businesses can guard themselves against them. Follow this advice, and you can better ensure that the walls around your website will be as strong as possible.

Web Application Security Tips from tCell

Author bio: Boris Chen is Vice President of Engineering and co-founder of tCell. He has more than 20 years of industry experience building high-performance web infrastructure and data technology. Before co-founding tCell, Chen spent five years at Splunk as VP of Engineering, from startup through IPO, where he helped drive Splunk’s petabyte-scale deployments and integration with Hadoop. Prior to joining Splunk, Chen was Director of Engineering at LucidEra, an early “Business Intelligence as a Service” innovator. At BEA Systems, where he was part of the original WebLogic acquisition, he led engineering teams working on the JRockit Java Virtual Machine, EAI and message bus products. Chen holds a B.S. in EECS from the University of California, Berkeley.  

 

(from Sam) P.S: This is a guest post, courtesy of tCell. “Guest” is not “Sponsored” and while the content is theirs, I selected and approved it as it covers a topic offering added value to businesses. As such, I want to thank them for giving me the opportunity to feature this guest post here.

Capture of a Google search about battery dying

Battery dying fast iPhone… Enters Huawei

Let’s talk smartphones, battery life and Huawei Mate 10. I actually started this post thinking that I would just make the most of a recent post I send to the interwebs sea in a social media bottle. However, since the SEO Gods and Google may night really like the fact that I would copy-paste not only the content but also the title, I set out on a – launch Google, type search – journey to find the perfect title for this post.

The topic of this article ? Smartphone batteries. The problem? Dying. The search? “Battery dying”. The results? To be seen in the headline picture and title 😉

Enters Huawei. You know? That technology company powering the telecommunications networks on a worldwide scale, that company that started selling phones and consumer technology at scale only a few years ago and is now holding a strong 3rd place, worldwide, when it comes to selling smartphones. And has its sights set not only on Apple, the number 2, but also the top spot still (miraculously?) held by Samsung.

Beyond the trade war bullshit (pardon my French) of the USA currently on a “China is spying” rampage that not any other civilised country is backing, Huawei are thriving and just recently launched the Huawei P20 and P20 Pro which are proving next level when it comes to smartphone quality, UX and camera quality.

Babbling aside, this piece aims at, simply, publishing an infographic these guys recently put together for the lazy me, featuring the outcomes and results of my trying out their battery challenge. In a few words, try to drain your smartphone’s battery, if you can!

Bummer, I failed. Success, I worked for 16 hours on my phone without a charge nor the need for one.

Enough talk now – Shut up, would ya! – let the figures do the talking. Feast your eyes on the experience and quality of the battery on the Huawei Mate 10:

Infographic Samuel Pavin data on Huawei Mate 10 battery challenge