Newsroom

What:
When:
OK

11.10.2021 / Software Deployment

Blog

The 4 Most Common Deployment Strategies in 2021

Software deployment is the process of remotely installing software on multiple or all the computers within a network simultaneously, from a central location The most popular deployment strategies currently used across the industry are discussed in this blog.

01.10.2021 / Cybersecurity

Blog

Security: Then, Now and Next

Security has been an ever-changing topic over the past few decades. This article focuses on the technology side of security operations and will look at how security practices have changed, where the current practices are heading, and how to achieve the best from modern security services.

23.09.2021 / AI/ML

Blog

Which Image Recognition API to Use?

Computer vision continues to be one of the hottest topics in the tech industry. With image/video recognition being considered the core of it, it’s been able to transform businesses using innovative techniques.

17.09.2021 / AI/ML

Blog

AI: The Enabler for Superhuman Achievements

This article presents several advancements made in the field of AI, with examples such as Tesla's autonomous driving system or Deep Mind's Alpha Fold. Several breakthroughs in AI problems showcase the potential of modern AI systems, although some limitations remain present.

10.09.2021 / AI and ML

Blog

AI/ML: The next big step in the telco industry!

The telecommunication industry has seen so many advancements in the recent years. As the 5G evolution brings in new use cases, Artificial Intelligence is key to accelerate the time to market for the 5G offerings. But how is AI and ML incorporated in the telco world?

03.09.2021 / AI

Blog

The use of AI in smart drones

The rising use of AI is clear in every industry. In this article the use of AI in drones will be discussed — why we want and need it to operate on a drone, what issues do we face when trying to deploy AI on a drone and finally how can we address those identified issues, to allow reliable AI operation.

27.08.2021 / Phishing

Blog

You’ve Been Smished! - So Now What?

Cyber Security professionals can spot an SMS Smishing or Email Phishing campaign, but how many know what they should do with them? What to do next is rarely discussed and few Cyber Security professionals are aware of the best practices. This article will guide you through several tactics to spot and report a phishing or Smishing when you receive one.

24.08.2021 / Cloud Migration

Blog

Cloud Migration Strategies

Cloud services have become one of the key accelerators in transforming organizational goals and long-term business needs. Moving to the cloud has generated both benefits but also challenges caused by the disruptions from the migration. This article will explore several strategies to overcome them.

16.08.2021 / Cloud Automation

Blog

Automated 5G Infrastructure deployment: in practice

In the previous article, we have discussed the theory of DevOps and Infrastructure as Code. It's now time to dig into the practical concepts of these topics and see actual results from a CI/CD pipeline that runs Terraform and deploys the infrastructure for a Kubernetes cluster that can host a 5G networking solution.

10.08.2021 / Cloud Automation

Blog

Automated 5G Infrastructure deployment : the theory

In this 2-part blog, we are using open-source technologies such as Terraform, Docker and Kubernetes to automatically deploy an infrastructure to AWS using GitlabCI. This blog will cover the concepts and technologies necessary in order to achieve this goal. More specifically, we will explain DevOps, CI/CD and Infrastructure as Code (IaC).

30.07.2021 / Cloud

Blog

Cloud Computing Amidst COVID-19 and Beyond

During the COVID-19 pandemic, organisations across all sectors faced disruptions, such as accommodating remote working, making products and services available online and ensuring their effective delivery. To help adapt to the "new normal" in the most scalable, time and cost-effective way, organisations have accelerated their path towards cloud adoption. 

27.07.2021 / Edge Computing

Blog

Edge Computing - Telco and Cloud in a Competitive Setting

In the era of edge computing in which Cloud and Telecom providers compete for enterprise opportunities, the relationship between them can be summarised as one of 'frenemies'. This article discusses the interdependence and competition between Cloud and Telecom providers and provides examples of their strategic partnerships.

12.07.2021 / Cloud Security

Blog

Cloud Security - Top 5 threats to be considered

The Flexera 2021 State of the Cloud Report states that 99% of organisations use at least one form of cloud technology. With Cloud having become so prevalent, we have seen Cloud-based cyber-attacks rise 630% in 2020 (Fintech News) which leads to the question, what should we be doing to protect our Cloud infrastructure?

05.07.2021 / Cloud

Blog

Infrastructure as Code – Pulumi challenges Terraform

In the past decade, server installation and configuration have been migrating to the cloud or virtual servers. In this blog, we compare the two most popular Open Source IaC tools: Pulumi and Terraform.

23.06.2021 / Business Analysis and Automation

Blog

Business Analysis and Automation – A Study

This week, we are diving into our Network Business Analysts' approach that helps network providers to understand where business gains can be made through automation of their support systems.

16.06.2021 / System Design

Blog

The Instagram Ecosystem

This week we aim to take a look at how we would approach to design an instagram-like ecosystem: All the way from following users to interacting with posts and stories, the whole 360° overview.

04.06.2021 / Cloud Security

Blog

Utilising Privilege Management

Gartner predicts that by 2022, 40% of privileged access will be ephemeral. In the same white paper, they discuss the advantages of moving away from Standing Privileges – a key risk factor – and developing a just-in-time model with zero standing privileges. What are these models and what would ephemeral user management look like?

28.05.2021 / Automation

Blog

Network Automation

With the Covid-19 pandemic and an increase in working remotely, companies are beginning to recognise that the growth in data and devices within their network is starting to outpace their IT capabilities. In this blog we explain how companies can benefit from network automation, how to get started and which automation tools to consider. 

21.05.2021 / Automation

Blog

Automation: a guide to testing

In this blog we will discuss automated testing within projects, outline how this is done on a high level as well as explain how beneficial automated testing is within any ongoing software projects.

14.05.2021 / Automation

Blog

Security Automation

The rise in automation has shown value for businesses across many industries and functions within, and IT security is following a similar trajectory. Many security management tools have evolved to incorporate automation capabilities to solve the problem of manual processes when dealing with non-manual cyber threats.

05.05.2021 / 5G Security

Blog

Security considerations for 5G

With the improved technological capabilities of 5G, operators are encountering a significantly increased attack surface with more potential entry points for attackers. Here we look at the considerations you need to take for 5G networks.