Logo Teldat

BLOG

CE Marking – Certification and Marking

CE Marking – Certification and Marking

The certification of devices equipped with radio technology, together with their corresponding marking, has always been essential to ensure operational safety, electromagnetic compatibility, and the interoperability between systems. These processes were traditionally considered a regulatory obligation to access certain markets. However, due to the rapid growth of...

read more
Open Data – contributes to Smart Cities

Open Data – contributes to Smart Cities

A few weeks ago, we blogged about the importance of Smart Cities to promote smart sustainable cities. Half the population worldwide now lives in big cities, and this figure is expected to rise over the next ten years. Recent UN studies show that urban centers consume...

read more
CSMA and media access control

CSMA and media access control

Si dividimos un sistema de comunicación genérico en sus partes más “simples” podemos distinguir cuatro elementos: Un emisor, un receptor, un mensaje y un medio o canal para comunicarlo. Uno de los problemas que surgen desde que se establece la comunicación es el...

read more
Intent Based Networking

Intent Based Networking

According to the prestigious consulting firm Gartner, Intent-Based Networking System – IBNS - technology will be the go-to tool for managing data networks in a few years’ time. It is an evolution of Software-Defined Networking SDN / SD-WAN.  If we take into account...

read more
Peer-to-peer networks

Peer-to-peer networks

Cryptocurrencies have been hailed as one of the greatest technological revolutions of recent years. Bitcoin is the pioneer and best-known of them, but there are hundreds more – each with different characteristics, objectives and technologies behind them to make them...

read more
Segmentation in SD-WAN

Segmentation in SD-WAN

The SD-WAN market is gaining more and more strength; software-defined and managed connectivity solutions provide ever more possibilities and functionalities to adapt to the reality of business networks. One of the key aspects that all companies value is security. In...

read more
DTLS security over UDP

DTLS security over UDP

DTLS (Datagram transport Layer Security) is a protocol that provides privacy for UDP communications. To understand DTLS, you first need to understand UDP. UDP (User Datagram Protocol) is a transport layer protocol based on the exchange of datagrams (encapsulated in...

read more
Microservices, Dockers and Kubernetes

Microservices, Dockers and Kubernetes

Many companies today are opting for microservices-based architecture. And this most certainly has to do with the fact that microservices are a perfect complement to SDN/SD-WAN technology, allowing the modules that make up the applications to be implanted in numerous...

read more