Logo Teldat

BLOG

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

Increasing Cybersecurity Risks in IoT and Edge Computing in 2025

In 2025, the cybersecurity risks continues to undergo a drastic transformation due to the massive consolidation of IoT and Edge Computing. It’s not just about more connected devices — it’s about increasingly intelligent nodes with processing and decision-making capabilities at the network edge. This technological shift expands the attack surface and introduces new...

read more
Uptime is down. Long live the fleeting!

Uptime is down. Long live the fleeting!

Since the early days of systems administration, a god has hovered over server rooms: uptime. uptime tells us how long a server has been on, which indirectly indicates how long it has been since it had a problem requiring a reboot. Operating systems have always had...

read more
Why Apache Kafka?

Why Apache Kafka?

These days, numerous applications follow a microservices architecture. And many applications manage large amounts of data (user activity on the application, logs, metrics, etc.) that are constantly travelling back and forth between microservices. This can produce a...

read more
Private LTE networks

Private LTE networks

Up until now, we have talked extensively about 4G and 4G+ (4G Advanced) mobile communications, and even more so about the upcoming 5G networks. However, I would like to take this opportunity to address mobile wireless technologies based on a private LTE network. As...

read more
And we come to SD-WAN

And we come to SD-WAN

When I first laid my hands on a computer in the early Eighties, I didn’t realize at the time the full magnitude of what I was looking at. From then on, the interest in technology was never to end. Soon, personal computers (PC), with their colorful screens and...

read more
In the beginning there was BITCOIN

In the beginning there was BITCOIN

Few things have spurred as much interest in the ICT sector in recent times as Blockchain technology. It stems from an article titled “Bitcoin: A Peer-to-Peer Electronic Cash System” published on May 24, 2008 by a certain Satoshi Nakamoto[1] , along with a computer...

read more
A plate full of symbols

A plate full of symbols

Just by looking at the bottom or rear part of an electronic IT device (such as a computer, router, monitor, etc.) or its accessories (mouse, keyboard or power source), we can identify a common feature: all of them have an identifying plate full of symbols. Each...

read more
A little Smarketing please…

A little Smarketing please…

Most successful companies and corporations have professional sales and marketing teams. If we were to summarize the work of marketing specialists, we could say that it involves creating products and producing content (advertisements, resources, visual elements, etc.)...

read more
SD-WAN: Enhancing corporate security

SD-WAN: Enhancing corporate security

The Spanish Private Security Act sets different corporate security degrees or levels. Level 1 has the lowest requirements, while Level 4 corresponds to businesses or locations considered critical from a security point of view. Starting at Level 2, having a connection...

read more
Robot Framework and test automation

Robot Framework and test automation

Process automation is becoming increasingly important when developing new software and hardware, as a means to detect implementation failures, carry out behavioral tests involving resources and scenarios, etc. On top of saving employees a great amount of time, it is a...

read more
eSIM – the next step in SIM technology

eSIM – the next step in SIM technology

We’re living at an age where the technologies used in telecommunications keep changing for the better. It seems it was only yesterday when we were discussing the advantages 3G could bring, and now 5G is already knocking at our door. When we think about a change in...

read more
Vehicle digitalization in different markets

Vehicle digitalization in different markets

Reinventing an organization in the telecommunications sector is a difficult but rewarding task. Corporate strategy through to process reengineering, if properly implemented, can have a positive impact on costs and efficiency when launching a product to market (at the...

read more