BLOG
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025
In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. It’s not just about more connected devices — it’s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new...
Kategorien
eSIM: Two different flavors for the same technology
eSIM (or embedded SIM) technology is destined to replace the traditional SIM cards that you insert in your mobile phones when you buy a new terminal or switch mobile phone operators. The eSIM is an eUICC (Embedded Universal Integrated Circuit Card) chip on the circuit...
Covid-19, Information Technology and Data Protection Law
The current Covid-19 crisis has some of you wondering if it is the result of a biological weapon from a shady military lab. The answer is a simple no! As the scientific community so rightly states, nature is enough and more than enough to make new viruses like this...
SD-WAN – digital transformation in times of COVID-19
The world is different now to how it was a few weeks ago. Owing to the outbreak of COVID-19 and the declaration of a pandemic, we have been forced to take unprecedented global measures. With the bulk of the population confined to their homes, many companies, from SMEs...
Data access security
As time goes by, data access security is becoming a more pressing requirement in the technological world. Companies are more aware of how important it is to guarantee that those that access corporate platforms are who they say they are. Since the number of data stored...
IoT: Use cases and challenges
After several years in which the growth forecasts for the IoT market were not met, 2019 exceeded expectations, and certain market analysts predict connected devices will increase by 21% in 2020. We can therefore say that the broader adoption of this technology is...
Overcoming entanglements without affecting developers
Last week’s article described the difficulties faced by developers when working with distributed and/or microservice architectures, often lacking in-depth knowledge about the underlying network technologies that enable different components of the architectures to...
The operational challenges of distributed software architecture
Microservice-based architectures are changing the way we design software today, raising new challenges in development and operations. These architectures are adding a strong network dependency on business logic, increasing the number of potential hazards, which grow...
Cloud Testing, friend or foe?
In a society that is ever increasing its use of technology and showing no signs of slowing down, it is becoming more and more pertinent to ensure the best quality products. Companies are being pushed to reach a wider audience by accelerating innovation and constantly...
DevOps and Cloud: A Perfect Symbiosis
I’ve always been fascinated by the way in which different computing concepts get converted into common knowledge and how, depending on who’s speaking about a certain concept, that person will tend to assimilate it according to their own field of knowledge and action....
Interpreting manufacturers’ datasheets
We’ve all heard the phrase that timing is everything. Nowadays, the buses that connect, for example, processors to main memory require very precise timing, in the order of tenths of nanoseconds. Manufacturers provide all this information in their datasheets, but it...
Smart tourism
Now that the second decade of the 21st century is about to end, sustainability and digitalization have become challenges all city areas must face. With this in mind, the 40th FITUR edition, which just took place in Madrid, has greatly focused on the need to...
TDD & Massive MIMO for 5G
A fundamental feature of wireless (duplex) bidirectional communication systems is the way to separate the transmitted and received signals. We almost always find that the standard either establishes alternating them in time intervals, with the device quickly switching...



















