Securing DataMiner | Part 3: Database – Cassandra

Databases are some of the most crucial components of your infrastructure. Because they contain a lot of sensitive data, threat actors find them very valuable targets. Because DataMiner typically oversees your entire operation, we highly recommend users harden their databases.

How we do it: peer code review

Since we started working together in squads, we’ve noticed that every developer has his own approach to coding. This results in different work approaches and coding experiences, like for example, …

New Teleport Research: Building a better NOC

The network operations center (NOC) is the beating heart of satellite and teleport operators’ networks. But with networks getting more complex and new technologies springing up like mushrooms, service operators …

Tailor-made control panels in a jiffy

Having quick and easy access to the right controls is vital for any media operation. However, there’s no one-size-fits-all setup when it comes to the Master Control Room. As media …

WTA Virtual Executive Dialogues

Recently, Skyline’s CEO, Ben Vandenberghe, and VP Product Marketing, Steven Soenens, were invited by WTA to share their insights about ‘Virtualization’ and ‘Digital Transformation’, two burning hot topics in the industry.

Skyline’s AI team wants to hear from you

How would you like to see the autonomous AIOps capabilities of DataMiner increase your efficiency, reduce your costs and help you move from a reactive to a proactive operation? We, …

See you in 2022

Thank you all so much for making the Dojo community grow and flourish! We’re looking forward to seeing what 2022 has in store.

warning

Responding to Log4Shell vulnerability

On December 9th 2021, a critical vulnerability was identified in Apache Log4j, a popular Java logging library. The vulnerability (CVE-2021-44228), also referred to as Log4Shell, is affecting all Log4j2 versions prior to 2.15.0.