02.12.2022 / Innovative Solutions


Network Maestro

Effective Migration from legacy, vertically integrated solutions, towards multi-vendor, interoperable, vendor-agnostic and integrated end-end high-speed internet infrastructure – Reply's Network Maestro Blueprint is a route to success.

11.11.2022 / IoT


Internet of Things and Automation

As of 2030, the global connected IoT devices are expected to grow by over 29.4 billion.  The development and fusion of real-time analytics, sensors, embedded systems, wireless systems, automation, control systems, and machine learning, have made IoT viable and practical. In this blog, we explore applications of IoT with a focus on automated drones and real-time validation using AI.

19.10.2022 / FinOps


FinOps - Introduction, Origin & Next Steps

Companies are moving their computing capacity to the cloud to benefit from the fact that the systems are managed (outsourced) by a 3rd party e.g., AWS, Azure, Google cloud etc. Efficient architecture is always the focus, however, due to a rush or uninformed decisions, various companies have been in a position where the spending on cloud services was too high.

16.09.2022 / Feature Flags



Feature flags allow for application behaviour to be controlled at runtime. Their implementations can be as simple as a home-grown environment variable interface, or be a more complex evaluation system using metadata to derive the flag values.




Net Reply are proud to sponsor the Broadband World Forum this year, where we will showcase our innovative solutions and capabilties. Network X is where the telecom and mobile industry comes together to spark powerful debates and connections. This is the new home of the long-running 5G World and Broadband World Forum, which will be joined by the newly launched Telco Cloud, designed to cover the full spectrum of the telecoms ecosystem.

19.08.2022 / Kubernetes


Innovation in Containerisation

Technology innovation has dramatically increased computing resources, usability, availability, and costs. In the past, there were not many options that allowed multiple users to use a single machine. One of the earliest methods of sharing computing resources was through a method called Time-Sharing.

14.07.2022 / Security


Protect Lessons Learned

After the end of several projects, it can be useful to come together and assess what was successful as well as the pain points that were faced. These are some of the lessons that Net Reply has learnt to avoid obstacles and ensure a smooth delivery.

07.04.2022 / Artificial Intelligence


AI Image Process Automation Tool - Demo

In our previous blog, we introduced our AI Image Processing Tool, its capabilities and applications. This blog will now cover an example of a practical use case to provide you with food-for-thought. Read to discover a step-by-step application of our Tool!

04.04.2022 / Artificial Intelligence


AI Image Process Automation & its Practical Uses

Our AI Image Process Automation Tool is able to detect and label objects in images, simplifying repetitive and error-prone tasks. But how does it work exactly? Where could this tool be applied and which benefits can it bring you? Read this article and find out!

21.02.2022 / Security


Working Remotely, Working Securely

The rise of remote working has brought many security risks, which is increased by a lack of remote working security training by organisations. This article stresses the importance for security awareness programs to be an on-going practice and not a one-time/annual event.

04.02.2022 / Cyber-Security


Phishing is on the Rise

Ever received an email that just did not look right? An analysis of more than 55 million emails reveals that one in every 99 emails is a phishing attack. As every organisation is one click away from an experiencing a phishing attack, this blog dives into the components to looks for when receiving a suspicious communication and stresses the importance of. security awareness training.

28.01.2022 / Development


WebRTC Demystified for Devs

WebRTC provides a feature rich framework for developers that makes it easy to build applications for browsers to communicate in real time. But how does it work? Which components must be understood to build a WebRTC application? Read this blog to find out!

25.01.2022 / Security


The Evolution of Security Culture

We've previously seen how security practice and technologies have changed over the last couple of decades, today, we look at how security culture has changed with it.


Press Article

Cybersecurity threats challenging businesses in 2022

Dan Tremeer, Net Reply UK, responds to questions related to the cybersecurity challenges companies will be facing in 2022 in an article published at Global Banking and Finance.



Securing 5G - The Challenges and Opportunities

If your role involves 5G enablement, watch this video to discover the challenges, risks and opportunities of securing a 5G ecosystem!

19.11.2021 / Edge Computing


Security in Edge Computing

According to all the usual suspects in IT trend forecasting, edge computing is the latest and greatest growth area. Currently, about 10% of enterprise related data is created and processed outside the centralised systems, in the data centres or corporate cloud environment, but this will grow to the majority of the data within two or three years.

12.11.2021 / Edge Computing


How Edge Computing can help offload the network infrastructure

In this article we are exploring three aspects of Edge Computing: Content Delivery networks (CDNs), Computation on the Edge and on-device processing; with real-world applications that helped offload the network infrastructure, saving cost and giving a better user experience to consumers.

22.10.2021 / Cloud


Multi-cloud Strategy

As organisations are taking a step to modernise and digitalise their traditional workloads, the Cloud has played a crucial role. In this article, the different types of Cloud strategies, as well as the benefits and challenges of the Multi-Cloud, will be analysed.

11.10.2021 / Software Deployment


The 4 Most Common Deployment Strategies in 2021

Software deployment is the process of remotely installing software on multiple or all the computers within a network simultaneously, from a central location The most popular deployment strategies currently used across the industry are discussed in this blog.

01.10.2021 / Cybersecurity


Security: Then, Now and Next

Security has been an ever-changing topic over the past few decades. This article focuses on the technology side of security operations and will look at how security practices have changed, where the current practices are heading, and how to achieve the best from modern security services.

23.09.2021 / AI/ML


Which Image Recognition API to Use?

Computer vision continues to be one of the hottest topics in the tech industry. With image/video recognition being considered the core of it, it’s been able to transform businesses using innovative techniques.