NEWS

Constraint-Based Electronic Design
"The Constraints". While electronic schematics provide a practical way to represent the components and connections within a circuit, they are ultimately a simplification that overlooks important aspects of how the circuit actually behaves. Connection lines are assumed to have no resistance, inductance, parasitic capacitance, or propagation delay, and Kirchhoff’s...
Dead Reckoning on how to improve road transport navigation
Dead Reckoning is the process of calculating the current position of an object based on estimates. Despite its origins in seafaring, it can have a significant impact on road transport. In a world dominated by GNSS technologies, understanding the implications of Dead...
Cybersecurity vulnerabilities are affecting to suppliers and customers
In addition to being a data protection tool, cybersecurity software is the first line of defense against external threats or cybersecurity vulnerabilities. So, what happens if the software itself is vulnerable? In the last few years, we’ve seen how attackers exploit...
Developing a Robust Disaster Recovery Plan in the Cloud
In an increasingly digital world, businesses depend on cloud-based systems for everything from data storage to critical applications. While the cloud offers significant benefits—such as scalability, flexibility, and cost efficiency—it also presents new challenges in...
Quadruple Extortion in Ransomware: The Evolution of Cybercrime
The advance of the Internet and new technologies has led to major developments in companies and organizations, but it has also led to a large number of threats in the field of cybersecurity. The Evolution of Ransomware to Quadruple Extortion Ransomware has emerged as...
The Importance of Cybersecurity in the Healthcare Sector
In recent decades, the healthcare sector has undergone a profound digital transformation, enhancing efficiency in patient care and information management. However, this shift has also made healthcare organizations more vulnerable to cyberattacks. The systems handle...
Enhancing Enterprise Network Security: Implementing 802.1X and NAC on Switches
In today’s enterprise landscape, network security has become a top priority. As cyber threats grow increasingly sophisticated, it is crucial to ensure that only authorized devices and users can access the network. This is where 802.1X authentication, combined with...
Cyberattacks in August: Heightened risks during vacation season
Who has been targeted by a cyberattack this August? For millions around the world, August is synonymous with vacations. As beaches fill up and offices empty, another group is gearing up to exploit the season: cybercriminals. This month, more than any other, offers a...
On-board railway technology developments focusing on AI
In most productive sectors, artificial intelligence (AI) has become a key in transforming processes and optimizing business resources, making them more agile and efficient. This path towards modernization revolutionizes our life habits, as well as the technology...
About VLANs on Switches
Continuing the series of blogs posts on the most representative technologies to consider when selecting switches, this time we look at VLAN technology. VLANs arose from the need to isolate different stations operating on the same physical local network. In addition,...
The Spanning Tree algorithm in Switching: a link between reliable and efficient networks
In the boundless realm of telecommunications, making sure networks run efficiently and undisturbed is crucial. Today, we are going to focus on the fascinating Spanning Tree algorithm (STP) and its relationship with switching. We will find out how this unsung hero...
The role of communications in the mining sector
In complex mine scenarios, where machinery roars, dust rises and darkness reigns, communications become essential tool to shine light on safety and efficiency. Not only that, but they support coordination, decision-making and the well-being of workers. For instance,...
Switches: Link Aggregation Techniques
Continuing our series of blog posts on the most representative technologies to consider when selecting switches, we will now address port & link aggregation technologies. Historical background on port & link aggregation In the evolution of Ethernet...
Observability in IT networks
In the ever-changing world of IT networks, observability has become crucial to ensure computer networks run safely and efficiently. The ability to understand and monitor the internal states of a system in real time has become essential in areas as wide-ranging as...
Understanding the technology behind heat pipes
Heat pipes transfer heat on electronic devices & industrial applications, using the heat transition principle, to transfer to heat sinks within a cooling system. Heat pipes have clear advantages over other heat dissipation methods. What are heat pipes? Heat pipes...
The vehicle of the future
One day, Henry Ford said: "If I had asked people what they wanted, they would have said faster horses". Twenty years later, horses had disappeared from the roads. Today, vehicles come with advanced safety, alternative fuels, and intelligent driving assistance...
Security attacks on Supply Chains
In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent years, we have witnessed...
The importance of sequencing power domains in electronics
There is a clear trend in the electronics industry for integration, allowing for more compact and efficient designs. More and more, electronics manufacturers are making their chips smaller, including more components within their chips and extending the feature range....
Switches: Stacking/grouping/virtualization techniques
This blog post is the first in a series in which we will analyze the most notable technologies that we should take into account when selecting switches. Its aim is not to give a comprehensive description or follow any “didactic” order. One of the main characteristics...