Bye-bye, Internet Explorer!

Internet Explorer has been on the chopping block for some time now, with official support ending in June 2022. But now the end truly is in sight for this old …

warning

Critical OpenSSL Vulnerability

NATS confirmed they are not affected by the vulnerabilities, for more information see this NATS forum post.For any questions, please contact infosec@skyline.be.

OKR cycle – plan, evaluate, adapt, repeat

Implementing the OKR framework is not as clear-cut as just setting goals and trying to reach them. The most vital and challenging part is ensuring maximum company-wide alignment and engagement …

The benefits of OKRs: F.A.C.T.S.

If you’ve read our previous blog post on the basics of OKRs, you already know what OKRs are and how you can create them. But WHY should you implement them? …

Ziine – your reference for Visual Overview functionality

Visual Overviews provide you with a very powerful and graphical way to navigate, monitor, and manage your entire infrastructure. However, designing Visual Overviews can sometimes feel a bit daunting. To help you out, we’ve created the “Design Examples” view on our Ziine demo system.

Orchestration of upcoming 5G networks

Lately, initial rollouts of the fifth generation (5G) of mobile networks have been popping up all across the globe. But what exactly is 5G, and what are its differences compared …

Securing DataMiner | Part 3: Database – Cassandra

Databases are some of the most crucial components of your infrastructure. Because they contain a lot of sensitive data, threat actors find them very valuable targets. Because DataMiner typically oversees your entire operation, we highly recommend users harden their databases.

How we do it: peer code review

Since we started working together in squads, we’ve noticed that every developer has his own approach to coding. This results in different work approaches and coding experiences, like for example, …