courriels@omegatelecom.ci
+225 27 20 30 76 24




News & Events

Technologies, News, Articles, Events, Forum ...

img

Optical fiber

The self-supporting fully dielectric overhead ADSS cable is an idea for an installation in the distribution as well as transmission environment installations are necessary as its name suggests, there is no support or messenger wire required, therefore the installation is carried out in a single pass. Structural features: Double layer unique Single layer, loose tube stranding, non-metallic resistance element, semi-dry water blocking, aramid wire resistance element, PE outer sheath. Includes 2 hearts, 4 hearts, 6 hearts, 8 hearts, 12 hearts, 16 hearts, 24 hearts, 36 hearts, 48 hearts, 96 hearts, 144 hearts, up to 288 hearts.

Read More
img

Geostationary Satellite

The operator Eutelsat has just signed a contract with Thales Alenia Space for the delivery of a state-of-the-art multibeam geostationary satellite in 2019. "The satellite will have a total capacity of 75 Gbps or the possibility of offering the equivalent of 300 to 400 000 ADSL connections. We multiply our capacities on the African continent, "says Eutelsat. The satellite will cover around thirty countries, mainly in sub-Saharan Africa. It will serve both individuals and businesses equipped with dishes about 75 centimeters in diameter. According to the operator, there could be around 650 million broadband users in Africa by 2020.

Read More
img

Cryptography.

Asymmetric cryptography can be illustrated with the example of public and private key encryption, which is an encryption technique, that is to say that the aim is to guarantee the confidentiality of a data. The asymmetric term applies in the fact that there are two encryption keys (which the user who wishes to receive messages makes himself), such as if the user uses a first key in an algorithm known as "de encryption ”, the data becomes unintelligible to all those who do not have the second key, who can retrieve the initial message when this second key is given as an input to a so-called“ decryption ”algorithm

Read More