Logo Teldat

BLOG

Constraint-Based Electronic Design

Constraint-Based Electronic Design

"The Constraints". While electronic schematics provide a practical way to represent the components and connections within a circuit, they are ultimately a simplification that overlooks important aspects of how the circuit actually behaves. Connection lines are assumed to have no resistance, inductance, parasitic capacitance, or propagation delay, and Kirchhoffโ€™s...

read more
Quantum computing and cybersecurity

Quantum computing and cybersecurity

We are currently in the midst of a quantum computing revolution that threatens to break all processing limits. When we apply these concepts to cybersecurity, we find potential quantum computing applications that can help us improve cybersecurity or crack it. Quantum...

read more
Cybersecurity for Industrial Environments

Cybersecurity for Industrial Environments

In recent years, industrial environments have undergone significant changes. Industry 4.0 has led to numerous advancements in production and operations, but it has been primarily defined by the emergence of new technologies that were previously absent. Automation and...

read more
NIS 2 – Cybersecurity-related legislation in 2024

NIS 2 – Cybersecurity-related legislation in 2024

Now that 2024 is about to end, letโ€™s have a look at this yearโ€™s cybersecurity highlights. Changes in legislation like NIS 2 (both in countries and supranational bodies, like the EU) probably rank amongst the most important. All of these changes in legislation have...

read more