Logo Teldat

BLOG

Post-Quantum Cryptography: The Future of Digital Security

Post-Quantum Cryptography: The Future of Digital Security

Cryptography is the backbone of modern digital security, protecting everything from banking transactions to personal communications. However, advances in quantum computing threaten to break many of today’s cryptographic systems. This has spurred the development of what is known as post quantum cryptography an emerging field focused on designing algorithms that are...

read more
The importance of SD-WAN for SMEs

The importance of SD-WAN for SMEs

Small and medium enterprises (SME’s) make up an increasing percentage of existing companies. As a result, they account for almost all of the business fabric worldwide. However, given their limited size, their budget for human resources, technology, safety, and...

read more
How did Blockchain commence?

How did Blockchain commence?

As we previously mentioned in an article published in June 2019, the Bitcoin did not create a new computer technology but integrated a series of pre-existing techniques in a revolutionary manner. The possibilities this protocol could bring were soon condensed in a new...

read more
React, a new technology

React, a new technology

Launched in 2010 by Facebook, React is an open source technology that became popular when Facebook bought Instagram in 2014 and launched this new language. Facebook, together with a free software community made up of more than 1,000 developers, is in charge of its...

read more
SD-WAN in Latin America

SD-WAN in Latin America

It’s no secret to anyone that the concept of SDN/ SD-WAN has been gaining ground over the past four years. This is in direct response to a clear need to erase geographical boundaries and improve visibility, control, availability, performance, scalability and security...

read more
All gigabit accesses are born (free?) and equal…

All gigabit accesses are born (free?) and equal…

When gigabit accesses are mentioned, the first thing that comes to mind for most of us (especially in Spain) is a fibre-optic access network for speeds beyond 50Mb. Carriers take the optical fibre to your home, install an ONT and that’s it. Customers can choose...

read more
Uptime is down. Long live the fleeting!

Uptime is down. Long live the fleeting!

Since the early days of systems administration, a god has hovered over server rooms: uptime. uptime tells us how long a server has been on, which indirectly indicates how long it has been since it had a problem requiring a reboot. Operating systems have always had...

read more
Why Apache Kafka?

Why Apache Kafka?

These days, numerous applications follow a microservices architecture. And many applications manage large amounts of data (user activity on the application, logs, metrics, etc.) that are constantly travelling back and forth between microservices. This can produce a...

read more
Private LTE networks

Private LTE networks

Up until now, we have talked extensively about 4G and 4G+ (4G Advanced) mobile communications, and even more so about the upcoming 5G networks. However, I would like to take this opportunity to address mobile wireless technologies based on a private LTE network. As...

read more
And we come to SD-WAN

And we come to SD-WAN

When I first laid my hands on a computer in the early Eighties, I didn’t realize at the time the full magnitude of what I was looking at. From then on, the interest in technology was never to end. Soon, personal computers (PC), with their colorful screens and...

read more
In the beginning there was BITCOIN

In the beginning there was BITCOIN

Few things have spurred as much interest in the ICT sector in recent times as Blockchain technology. It stems from an article titled “Bitcoin: A Peer-to-Peer Electronic Cash System” published on May 24, 2008 by a certain Satoshi Nakamoto[1] , along with a computer...

read more
A plate full of symbols

A plate full of symbols

Just by looking at the bottom or rear part of an electronic IT device (such as a computer, router, monitor, etc.) or its accessories (mouse, keyboard or power source), we can identify a common feature: all of them have an identifying plate full of symbols. Each...

read more