In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent years, we have witnessed a growing threat: supply chain attacks. This digital "supply chain", while offering efficiency and flexibility, also creates new...
Switches: Stacking/grouping/virtualization techniques
This blog post is the first in a series in which we will analyze the most notable technologies that we should take into account when selecting switches. Its aim is not to give a comprehensive description or follow any “didactic” order. One of the main characteristics of professional switches is the feature known as stacking, grouping or virtualization. Different manufacturers refer to this...
The Cybersecurity Revolution: Artificial Intelligence and Machine Learning in Action
In the ever-changing and challenging cybersecurity scenario, one trend has emerged as a catalyst for change: the integration of Artificial Intelligence (AI) and Machine Learning (ML). These technologies are playing a pivotal role in fighting cyber threats, helping organisations anticipate and proactively respond to attacks. Before delving into the role AI and ML play in cybersecurity, it is...
Improving device reliability and redundancy
In a previous article we looked at how to mathematically calculate the reliability of electronic equipment. That is, the probability of it working correctly for a given period of time. This is best characterised by the Mean Time Between Failure (MTBF), or its opposite, Failure In Time (FIT). MTBF values are often in the order of hundreds of thousands of hours for electronic equipment. Source:...
A connected future: IoT, LoRaWAN and the importance of cybersecurity (SIoT)
In a world where technology is moving ahead at a staggering speed, the Internet of Things like SIoT (Secure Internet of Things) is revolutionizing our present by connecting everyday devices and objects to the web (fostering an unprecedented data exchange and transforming the way in which we interact with the environment around us). In this vast and exciting technological plane, a specific...
Electric Vehicle Charging Networks: AFIR Regulation and Connectivity
In several of our recent blogs on the adoption of electric vehicles and the deployment of related charging networks, we have highlighted how important communications and cybersecurity are for these installations. Not only do experts consider these aspects crucial, but the EU is already issuing mandatory regulations on the matter. The new Alternative Fuels Infrastructure Regulation, AFIR, entered...
Categories