BLOG
Increasing Cybersecurity Risks in IoT and Edge Computing in 2025
In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. It’s not just about more connected devices — it’s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new...
Kategorien
Anywhere Operations
After a year as turbulent as the past one was, it is interesting to see the latest trends identified in the world of new technologies, the momentum of which has been key to continuing to maintain the business fabric worldwide. It was the year of teleworking, of...
Intelligent Automation: benefits for enterprise & organizations
The telecommunications industry continues to be at the focus of growth, innovation, and disruption as a result of new technologies that continue to filtrate the market. The cut-throat competition and growing demand for seamless connectivity are the biggest challenges...
Trends in 2021: telecommunications will bring vast, social, economic & industrial changes
When clock struck twelve midnight on New Year’s Eve this year and we went into 2021, many of us thought… “that’s it, we have finally left behind us, the disastrous year of 2020 and we start the year 2021”, hoping that normality will return as soon as possible....
Teldat launches 5G web page
Teldat M8Smart-5G and Teldat-5Ge products in Teldat’s new 5G web page, offer advanced solutions for corporate services
Smart Rural 21 & 5G: The challenge of connecting rural areas
The movement of people in search of opportunities not available to them in their birthplaces has always been taking place. The last most significant migrations of people in Spain for example were: The rural flight, driven by the industrial revolution, which...
Connecting some of the dots between Nftables, Iptables and Netfilter
When it comes to packet filtering on Linux, Nftables (a successor to Iptables) has matured sufficiently in recent years for it to be considered the default tool to use today. However, Iptables is still widely used in modern systems (e.g., Debian buster), with it...
Ensuring security in corporate environments
Due to the radical change in the way we work in IT caused by COVID-19, communications and IT professionals and administrators have been forced to implement or improve necessary mechanisms to ensure security in corporate environments while maintaining their...
Log centralization in microservices with Fluent Bit
Nowadays, it is quite common for systems to be made up of many like subsystems and Fluent Bit. These include small programs that work together, full Operating Systems and proprietary applications. This growing number of subsystems needs maintenance to assess their...
be.SDx Corp: Teldat’s SD-WAN corporate solution
Teldat’s SD-WAN solution for corporate networks has a new section on the Teldat’s website… “be.SDx Corp”
SD-WAN: Finding a balance – II
Last week I shared some important aspects regarding SD-WAN (such as self-provisioning, automation, monitoring, etc.) that I have encountered while working with customers, Partners and Carriers in different countries in Central and South America. As mentioned, there...
Proactive Network Monitoring with Cloud-based SDN Technology
Software-defined networking (SDN) can be applied for cloud-managed networks that use dynamic configuration to improve performance and monitoring. It offers greater centralization than traditional networks, allowing administrators to achieve the flexibility and ease of...
SD-WAN: Finding a balance
For the past few years, we’ve been hearing the word SD-WAN a lot. In my daily work with customers, Partners and Carriers from different countries in Central and South America, I’ve found that companies are indeed implementing this type of technology, with the suite of...



















