Orchestration of upcoming 5G networks

Lately, initial rollouts of the fifth generation (5G) of mobile networks have been popping up all across the globe. But what exactly is 5G, and what are its differences compared …

Securing DataMiner | Part 3: Database – Cassandra

Databases are some of the most crucial components of your infrastructure. Because they contain a lot of sensitive data, threat actors find them very valuable targets. Because DataMiner typically oversees your entire operation, we highly recommend users harden their databases.

How we do it: peer code review

Since we started working together in squads, we’ve noticed that every developer has his own approach to coding. This results in different work approaches and coding experiences, like for example, …

New Teleport Research: Building a better NOC

The network operations center (NOC) is the beating heart of satellite and teleport operators’ networks. But with networks getting more complex and new technologies springing up like mushrooms, service operators …

Tailor-made control panels in a jiffy

Having quick and easy access to the right controls is vital for any media operation. However, there’s no one-size-fits-all setup when it comes to the Master Control Room. As media …

WTA Virtual Executive Dialogues

Recently, Skyline’s CEO, Ben Vandenberghe, and VP Product Marketing, Steven Soenens, were invited by WTA to share their insights about ‘Virtualization’ and ‘Digital Transformation’, two burning hot topics in the industry.

Skyline’s AI team wants to hear from you

How would you like to see the autonomous AIOps capabilities of DataMiner increase your efficiency, reduce your costs and help you move from a reactive to a proactive operation? We, …