BLOG
Threats to Cybersecurity in the Banking Sector
The digitalization of the financial sector has optimized service efficiency, remote access to banks and improved user experience. However, the risk of suffering cyberattacks has grown exponentially. In this context, cybersecurity has become a key strategic pillar for the progress of digitalization in the banking sector. The vast majority of reports show banks and...
Kategorien
A review of the physical principles behind the Wi-Fi /5G wireless revolution
Following on from a previous article on DSL and its scientific bases, I now want to review the fundamentals of another technology: radio. As with a DSL, the ability to transmit data in any radio communications system – from the very first Marconi experiments to 5G...
Network monitoring in SD-WAN
SD-WAN technology provides customers the capability to manage their own network without requiring managed services from the traditional service providers. However, so that the client can manage its own platform, a powerful tool has to be used, which manages and solves...
Traditional routers (CPE) and their limitations
For years, the data provision services offered by carriers had a common element: WAN routers or CPEs (Customer Premises Equipment). This hardware device allows the local network of an office to be connected to the corporate service network (thus granting access to...
Technologies that transport you to the other side of the world
In a mature market like telecommunications solutions, where you have many different types and sizes of businesses competing against each other and well-known brands, differentiation and added value are key to helping a company stand out. Therefore, a design strategy...
Will 5G solve the railway dilemmas?
Every day we hear more news on 5G, its progress and evolution, as the demand for connectivity between vehicles, towns and cities, devices and sensors continues to grow. As you might expect, the railway sector and it's train communications are no less affected, being...
What an old copper pair (and a bargeman) can do for you
DSL technology today gives connection speeds greater than 100Mbps over a support that initially appeared far humbler and limited to the long forgotten 33Kbps: a pair of copper wires. How is this possible? When conventional telephone lines - POTS – Plain Old Telephone...
The Internet of Things (IoT) and business success
Even though we are still far from Intel’s prediction about the Internet of Things (IoT), which stated that by 2020 there would be 26 devices per person, there can be no doubt that the Internet of things is here to stay and that it is a technology that is set to...
Are you being or practicing as an engineer in Spain?
First of all, my apologies to our international readers for the local nature of this post. That said, you may still be interested in reading about how, in a nation associated with parties, holidays and the siesta, there are companies offering highly-skilled technical...
WPA3: Improved Wi-Fi security
The nature of electromagnetic waves is such that anyone in a wireless network can receive the data sent over the air. With high-gain antennas, it is possible to listen in on the data that passes through an office from outside the building. That is why, right from the...
What are the SD-WAN Benefits
What are the benefits of SD-WAN? You may have heard a lot about this network. Indeed, in our blog we have written various posts on SD-WAN from different perspectives, but I believe that at this moment in time it would be interesting to review the benefits that this...
SD-WAN and flextime or teleworking
Technologies such as SD-WAN provide reliable technical solutions for companies and their employees in the new business paradigm of teleworking or flextime. Corporations are moving towards the reduction of corporate offices in order to strike a balance between cost...
Security holes in modern processor hardware
A few months ago (January 2018), the media reported breaking news of alleged security failures for Intel and ARM processors. In order to understand these “weaknesses”, and before briefly describing the nature of these “security holes”, we need to list some of the...



















