Blog

Get news about our products, which events we are attending plus industry insights and commentary

History of Tunneling Protocols

Posted by

Sarah Chandley

Sarah Chandley

Sarah is an experienced B2B technology marketing expert, creating thought provoking and informative content for the Cyber Security, Telco and Government Infrastructure sectors. 

on Friday, 17 August 2018. Posted in Cyber

Tunneling allows private network communications to be sent across a public network, such as the Internet, through a process called encapsulation. Encapsulation wraps private data packets with formatting and routing information so that when they pass thorugh the public network, the private data is usually ignored. Only the public network data added by the encapsulation is read to route the packet.

Detecting Cryptojacking in Carrier Scale Networks

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B product manager and leader, former board member and all round expert on everything cyber, telecom. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Monday, 06 August 2018. Posted in Cyber

Cryptojacking is running unwanted applications on endpoints and infrastructure, specifically crypto currency mining software, and it’s hard to detect. The cypto miner is stealing processing capability; Impacts are higher electricity (power and cooling) consumption, slower performance of legitimate applications or services. And high CPU run rates generate more heat and reduce lifetime.

Oversight of UK's Critical National Infrastructure - Chinese Vendors

Posted by

Steve Patton

Steve Patton

Steve is an experienced technical B2B product manager and leader, former board member and all round expert on everything cyber, telecom. Steve is a frequent speaker on topics including security breaches, big data analytics, audit and compliance, and IT forensics.

on Tuesday, 31 July 2018. Posted in Cyber, Government

In an industry awash with marketing hype, Critical National Infrastructure is, for once, an appropriate name – infrastructure that is critical to the continued safe and prosperous operation of a nation.

TDAC User Account Control Update

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 27 July 2018. Posted in 'Tech Talk' Blog, Company News

The TDAC User Account Control screens now support the ability to create custom user roles.

Openstack Automated VM deployment

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 27 July 2018. Posted in 'Tech Talk' Blog, Company News

Openstack Automated VM deployment is now live and working in our ATH testing environment.

Nuance ASR/TTS channel optimisation on the vARNE VoiceXML IVR

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Wednesday, 25 July 2018. Posted in 'Tech Talk' Blog, Company News

The vARNE IVR Nuance ASR/TTS channel usage has been optimised so that channels are only seized when needed

Supporting high availability and geo-redundancy with TDAC

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Monday, 23 July 2018. Posted in 'Tech Talk' Blog, Company News

Latest versions of the TDAC Analytics platform support deployments with a distributed architecture.

Monitoring QoS

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Monday, 23 July 2018. Posted in 'Tech Talk' Blog, Company News

Monitoring the quality of service on upwards of 1-2 Million flows per second can appear an impossible task.

Graduate Cyber Systems Engineer

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Friday, 20 July 2018. Posted in Company News

As a graduate engineer I am learning every day and the present I am working on automating tests.

Information Radiator

Posted by

Telesoft Engineer

Telesoft Engineer

The Engineers here at Telesoft are tackling the most challenging issues facing the Cyber and Telecom industries, working on problems that no one is even thinking about yet. 

The 'Tech Talk' blog has been created to give our Research and Development, Hardware and Software Engineering Teams a voice, creating posts that detail what technologies and techniques we are using to create our cutting edge products. So expect lots of interesting and varied subject matters.  

Created by Engineers, for Engineers.

on Thursday, 19 July 2018. Posted in 'Tech Talk' Blog, Company News

In Telesoft’s R&D department we’ve made an Information Radiator.

[12 3 4 5  >>  

Information cookies

Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.

There are several types of cookies:

  • Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
  • Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
  • Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.

So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.

However, please note that you can enable or disable cookies by following the instructions of your browser.