Category Archives: General

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress: strategies for resilience

Erecting an IT fortress is an urgent need these days. Facing the surge in cyber-attacks of these times, companies will need to adopt new strategies, procedures and technologies to become more resilient to the onslaught of cybercrimes. The pandemic has shown how vulnerable many organizations are to organized malicious actors. Meanwhile, the increasing weight of digital transformation has increased the number and the extent of disruption that could occur. Indeed, being IT-resilient means keeping to a minimum any type of disruption and downtime and ensuring service continuity. Looking for an increased resilience, IT teams are re-evaluating their shortcomings and processes when it comes to building their organizations’ security infrastructure. Approaches […]

Alan Turing: the life of the father of computing

Alan Turing: the life of the father of computing

Alan Turing is by consensus the father of modern computing. Are you using a laptop, a computer, a smartphone, or even set a network of IoT devices? Then you are using technologies made possible by the work, research, and insight of this young Fellow of the King’s College, University of Cambridge. Alan Turing is one of the world’s best-known mathematicians. By far, the most known in the past century. This is for his work on cracking German codes and the infamous Enigma Machine in World War II. But also for his arrest, conviction and punishment for homosexuality in the 1950s. This theoretical work was the basis for the later development […]

Bitcoin mining: What it is and how it works

Bitcoin mining: What it is and how it works

What does Bitcoin Mining mean? Bitcoin mining is the process of creating, or rather discovering, bitcoin currency. Unlike real-world money that is printed when more is needed, bitcoin cannot simply be willed into existence, but has to be mined through mathematical processes. Mining ensures the continuous reissue of Bitcoins like central banks do with paper currency. In general, to mine bitcoins, you need either a GPU (graphics processing unit) or an application-specific integrated circuit (ASIC) in order to set up a mining rig. Bitcoin mining: pros and cons However, it may be not that simple. First of all, you need a special computer to mine this cryptocurrency. Mining bitcoin concerns solving a […]

Adriano Olivetti: Life of an innovator

Adriano Olivetti: Life of an innovator

A shroud and halo of myth surrounds the figure of Adriano Olivetti. He was one of  the most prominent figures in the Italian cultural and industrial panorama, the one reserved for the stories of excellence. An entrepreneur, a man of culture, patron, politician, social reformist, and innovator that saw the future and transformed his ideals into reality. Olivetti introduced new organizational methods and humanistic idealism fueled his entrepreneurial life, by implementing dramatic changes in Italian business and in industrial relations. But what makes him an icon to follow and admire still today? Read our blog below to find out, then! Who was Adriano Olivetti? Born in 1901, Adriano Olivetti was […]

Agnes Meyer Driscoll: women in cryptanalysis

Agnes Meyer Driscoll: women in cryptanalysis

Agnes Meyer Driscoll was a leading cryptanalyst working for American defense agencies between WW1 and the early years of the Cold War. She started off her career in the US Navy, by enlisting in Code and Signal Section of the Director of Naval Communications. The approach to her work was innovative, by mixing manual decryption techniques and early and emerging automatic machine systems. Her technical studies on cipher rotors, moreover, led to a substantial advancements in American cryptography. Regarding her cryptanalytical work, Driscoll’s contributions allowed the US to break a wide range of diplomatic correspondence. Also, she was a specialist of Japanese naval codes. The breaking of these codes made […]

Enigma: a story about cipher mishandling

Enigma: a story about cipher mishandling

Enigma was a portable cipher machine producing a polyalphabetic substitution cipher. It had up to 5 rotor scramblers. Many versions included many sets of plugboard connections, which allowed a further swap of a letter with another once encrypted. Its inventor Arthur Scherbius originally developed it for commercial use in the 1920s. He later sold it to German Armed Forces since the early 1930s. The military Enigma equipped with 5 rotors and 10 plugboard connections has 158,962,555,217,826,360,000 possible combinations. Good operating procedures, properly enforced, would have made Enigma unbreakable in the 1940s. History teaches us that this was not the case. Many historians agree that the Allies won WW2 thanks to the deciphering of […]

Cablocracy: the history of (and the struggle for) undersea comms

Cablocracy: the history of (and the struggle for) undersea comms

Did you know that nations and power struggle for cablocracy, that is the control for strategic comms? In the age of wireless and mobile, few people know that a long net of submarine cables connects the world and allow communications cablocracy to take place. Today, more than 99% of international communications are carried over fiber optic cables, most of them undersea. In total, around 380 underwater cables in operation literally wrap the world. Data revels that their aggregate length is about  1.2 million kilometers. They deliver internet worldwide and are at the same one of the goals and the tools of today’s geopolitics. Let’s explore what cablocracy is, then. The […]

Olivetti P101: an Italian success

Olivetti P101: an Italian success

The Olivetti “Program 101” computer (P101), presented in 1965, is considered by some to be the first “personal computer” in history, as it had all the main features of large computers of the time, but its size allowed it to be used comfortably on your desk, so much so that it was then called “desktop computer”. The success of the P101 The P101 was a huge commercial success. The P101 wanted to be a consumer product capable of meeting the working needs of the highest possible number of people. Presented at the New York fair in ’65, it had sold over 44,000 copies all over the world in just a […]

How was the Internet born? the World Wide Web Revolution

How was the Internet born? the World Wide Web Revolution

By the end of the 1980s, ARPANET had expanded its nodes overseas and, through the TCP / IP protocols, had led to the creation of a vast “network of networks” of global scale: the Internet. At that point it was necessary to find a way to make the transmission of files and information on the network easy and accessible to all. This problem was solved on August 6, 1991, the day the World Wide Web was born. WWW: How did it all start? His story began a couple of years earlier. In 1989 at CERN in Geneva, the British researcher Tim Berners-Lee was struck by how some Italian colleagues transmitted […]

Telsy partecipa all’Open Innovation challenge della Regione Lazio

Telsy partecipa all’Open Innovation challenge della Regione Lazio

Lo scorso 29 aprile Telsy ha lanciato, in collaborazione con la Regione Lazio e Lazio Innova, la challenge “Autenticazione innovativa per dispositivi mobili”. L’obiettivo della sfida è quello di promuovere la progettazione e lo sviluppo di metodi e tecnologie innovative per l’autenticazione su dispositivi mobili. Ai gruppi partecipanti viene richiesto in particolare di sviluppare un sistema di autenticazione realmente affidabile e sicuro, capace di proteggere efficacemente gli smartphone del futuro.  In particolare la challenge è rivolta a: startup e PMI innovative registrate nelle apposite sezioni del Registro delle impresemicroimprese, startup e PMIteam informali composti da almeno tre personespin off universitari e di centri di ricerca. Le iscrizioni sono aperte e […]

Utilizzando il sito, accetti l'utilizzo dei cookie da parte nostra. maggiori informazioni

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close