NEWS
A New Path to IPv6 Networks
The shortage of IPv4 addresses has accelerated the move toward IPv6. With roughly 4.3 billion possible addresses (32 bits), IPv4 can no longer meet the needs of modern connected devices. IPv6, by contrast, uses 128 bits—roughly 340 sextillion addresses—providing virtually unlimited capacity for growth. Over the past few decades, several methods have been developed...
Observability in IT networks
In the ever-changing world of IT networks, observability has become crucial to ensure computer networks run safely and efficiently. The ability to understand and monitor the internal states of a system in real time has become essential in areas as wide-ranging as...
Understanding the technology behind heat pipes
Heat pipes transfer heat on electronic devices & industrial applications, using the heat transition principle, to transfer to heat sinks within a cooling system. Heat pipes have clear advantages over other heat dissipation methods. What are heat pipes? Heat pipes...
The vehicle of the future
One day, Henry Ford said: "If I had asked people what they wanted, they would have said faster horses". Twenty years later, horses had disappeared from the roads. Today, vehicles come with advanced safety, alternative fuels, and intelligent driving assistance...
Security attacks on Supply Chains
In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent years, we have witnessed...
The importance of sequencing power domains in electronics
There is a clear trend in the electronics industry for integration, allowing for more compact and efficient designs. More and more, electronics manufacturers are making their chips smaller, including more components within their chips and extending the feature range....
Switches: Stacking/grouping/virtualization techniques
This blog post is the first in a series in which we will analyze the most notable technologies that we should take into account when selecting switches. Its aim is not to give a comprehensive description or follow any “didactic” order. One of the main characteristics...
The Cybersecurity Revolution: Artificial Intelligence and Machine Learning in Action
In the ever-changing and challenging cybersecurity scenario, one trend has emerged as a catalyst for change: the integration of Artificial Intelligence (AI) and Machine Learning (ML). These technologies are playing a pivotal role in fighting cyber threats, helping...
Improving device reliability and redundancy
In a previous article we looked at how to mathematically calculate the reliability of electronic equipment. That is, the probability of it working correctly for a given period of time. This is best characterised by the Mean Time Between Failure (MTBF), or its...
A connected future: IoT, LoRaWAN and the importance of cybersecurity (SIoT)
In a world where technology is moving ahead at a staggering speed, the Internet of Things like SIoT (Secure Internet of Things) is revolutionizing our present by connecting everyday devices and objects to the web (fostering an unprecedented data exchange and...
Electric Vehicle Charging Networks: AFIR Regulation and Connectivity
In several of our recent blogs on the adoption of electric vehicles and the deployment of related charging networks, we have highlighted how important communications and cybersecurity are for these installations. Not only do experts consider these aspects crucial, but...
The importance of Real-Time Network Analysis and Trend Analysis
In our digital age, the relentless stream of information can be both constant and overwhelming. Within this landscape, real-time network analysis and trend analysis have emerged as indispensable tools for comprehending and leveraging this deluge of data. Across...
Exploring Security in the Cryptocurrency and Blockchain Universe
Most of us have likely encountered the term cryptocurrencies, yet not everyone is ready to engage in trading them. In today’s digital era, cryptocurrencies have disrupted the financial scene by providing a decentralized and secure alternative to traditional money....
The Importance of Technological Outreach
In today’s intricately connected and fast-paced business landscape, the evolution of business development extends beyond individual operations. Associations for strategic partnerships and organizational collaborations have emerged as pivotal elements for sustained,...
AI Image Processing in Embedded Environments
Artificial Intelligence (AI) is swiftly reshaping the public sector, promising to enhance efficiency, effectiveness, and accessibility of services through innovative use cases. Specifically, the integration of AI into public transportation services has revolutionized...
SSL decryption: Safe communications
In the immense digital world of today, information security has become a primary concern. Transferring data safely via the Internet is crucial in order to protect the confidentiality and integrity of sensitive information. A key tool for this is the SSL (Secure...
The benefits of smart metering for energy consumers and suppliers
Businesses of all sizes are under steady pressure to reduce their power consumption – not just to mitigate rising energy costs, but also to meet green legislation requirements. Besides, stakeholders like investors, employees and customers increasingly judge a company...
Latest Advances of 5G Plus
After years of ongoing discussions about 5G, and even some early talk about 6G in certain circles, this year has introduced a new buzzword: 5G Plus. As we enter the post-summer season and witness more carriers announcing their offerings on this cutting-edge network,...
Die neuesten Fortschritte von 5G Plus
Nach jahrelangen Diskussionen über 5G und in bestimmten Kreisen sogar schon über 6G, ist dieses Jahr ein neues Schlagwort eingeführt worden: 5G Plus. Mit dem Ende vom Sommer und den vermehrten Ankündigungen von Netzbetreibern, die ihre Angebote um dieses hochmoderne...







































