Logo Teldat

BLOG

SD-WAN Automation: The Secret to Large-Scale Deployments

SD-WAN Automation: The Secret to Large-Scale Deployments

Today’s corporate networks are undergoing rapid transformation. The digitization of processes, mass adoption of cloud applications, and the growth of remote work have made connectivity a strategic resource. SD-WAN has become a key technology, enabling traffic optimization, robust security, and streamlined management of shared networks. This evolution raises a...

read more
And we come to SD-WAN

And we come to SD-WAN

When I first laid my hands on a computer in the early Eighties, I didn’t realize at the time the full magnitude of what I was looking at. From then on, the interest in technology was never to end. Soon, personal computers (PC), with their colorful screens and...

read more
In the beginning there was BITCOIN

In the beginning there was BITCOIN

Few things have spurred as much interest in the ICT sector in recent times as Blockchain technology. It stems from an article titled “Bitcoin: A Peer-to-Peer Electronic Cash System” published on May 24, 2008 by a certain Satoshi Nakamoto[1] , along with a computer...

read more
A plate full of symbols

A plate full of symbols

Just by looking at the bottom or rear part of an electronic IT device (such as a computer, router, monitor, etc.) or its accessories (mouse, keyboard or power source), we can identify a common feature: all of them have an identifying plate full of symbols. Each...

read more
A little Smarketing please…

A little Smarketing please…

Most successful companies and corporations have professional sales and marketing teams. If we were to summarize the work of marketing specialists, we could say that it involves creating products and producing content (advertisements, resources, visual elements, etc.)...

read more
SD-WAN: Enhancing corporate security

SD-WAN: Enhancing corporate security

The Spanish Private Security Act sets different corporate security degrees or levels. Level 1 has the lowest requirements, while Level 4 corresponds to businesses or locations considered critical from a security point of view. Starting at Level 2, having a connection...

read more
Robot Framework and test automation

Robot Framework and test automation

Process automation is becoming increasingly important when developing new software and hardware, as a means to detect implementation failures, carry out behavioral tests involving resources and scenarios, etc. On top of saving employees a great amount of time, it is a...

read more
eSIM – the next step in SIM technology

eSIM – the next step in SIM technology

We’re living at an age where the technologies used in telecommunications keep changing for the better. It seems it was only yesterday when we were discussing the advantages 3G could bring, and now 5G is already knocking at our door. When we think about a change in...

read more
Vehicle digitalization in different markets

Vehicle digitalization in different markets

Reinventing an organization in the telecommunications sector is a difficult but rewarding task. Corporate strategy through to process reengineering, if properly implemented, can have a positive impact on costs and efficiency when launching a product to market (at the...

read more
Open Source Software Licenses

Open Source Software Licenses

A few weeks ago I wrote a post on the Teldat blog about open source software. I explained how we were seeing the tremendous growth in the use of open source software in recent years. So much so, that the top acquisitions within the technology sector in last year have...

read more
The autonomous vehicle and smart cities

The autonomous vehicle and smart cities

Like many things in our lives, and as a result of the technological revolution, cities are subject to a constant transformation as they respond to the needs of the citizens who live in them and maintain or increase their sustainability. With the emergence of the IoT...

read more