When a 15-year-old hacker outsmarted our Ham radio security and then took down our phone line in retaliation, we learned lessons that shape our approach to wireless security to this day. This true story reveals why low probability of intercept, robust encryption, and end-to-end security matter more than ever in modern wireless communications.
Read MoreWhen is an invention an invention? How do I know if my invention is patentable? Learn the difference between good ideas and patentable inventions from an experienced RF engineer. Discover what makes an invention truly patentable and avoid common pitfalls in product development.
Read MoreWhy would anybody keep using a radio that is over 30 years old? As crucial pieces of equipment go beyond the period of support from the original equipment manufacturer (OEM), third-party support can become quite daunting. Read more about how we provide this crucial service to both commercial and defense customers.
Read MoreSooner or later, almost everyone in a business environment winds up having to make decisions about some sort of wireless or RF system. The big challenge is making the right decision in a field that has so much specialized knowledge. So how do you tell the difference between reasonably correct information, and total bull?
Read More