Logo Teldat

BLOG

Certified Products – A key factor for companies & customers

Certified Products – A key factor for companies & customers

Certifying a companyโ€™s products according to specific standards is a crucial process that brings a variety of benefits to both the company and its customers, as well as to society at large. Have certified products involves evaluating and ensuring that a product meets the requirements set by an external authority or organization. These standards are often related to...

read more
Big movements in the sector

Big movements in the sector

As I have done in previous years around this time, I would like to take this opportunity to summarize some of the most important issues we have encountered in 2017. This year is proving to be a very interesting year for the telecommunications sector. First of all, the...

read more
Access to guest networks

Access to guest networks

Nowadays, all companies provide their customers with Wi-Fi in some form or another. We find it in shopping malls, airports, restaurants, offices and even on transport. It is fair to say that Wi-Fi has become a commodity. Most customers want to connect to Wi-Fi...

read more
5G: How it will change our lives

5G: How it will change our lives

The advent of 5G technology signifies the start of an even more globally connected society, a completely digital society. This technology, expected to be implemented in 2020, will change the way we interact with each other and objects, allowing us to be permanently...

read more
Power electronics in telecommunication equipment

Power electronics in telecommunication equipment

The application of power electronics to communications devices has to do with the processing of the electrical input power using semiconductor devices and reactive elements. Thus, the raw input power is processed according to a control input that conditions the output...

read more
WannaCry – Bitcoin – Crime

WannaCry – Bitcoin – Crime

The first and so far the only time I was personally involved, (or to be more precise my son who at that time was eleven years old), in a cyber-attack by ransomware was in 2012. The computer of my son was apparently blocked by the Federal Criminal Police Office due to...

read more
Dynamic DNS Update – Teldat

Dynamic DNS Update – Teldat

Nowadays,ย if you check the public IP address with which you access the Internet, you will find that it often changes. This is due to the chronic shortage of IPv4 addresses, which are insufficient to cover current service demands. ISPs, therefore, often assign dynamic...

read more
First SHA-1 collision

First SHA-1 collision

In February this year, a team of researchers both from Google and CWI Institute in Amsterdam announced that they were able to generate two PDFs documents with different content that would hash into the same SHA-1 digest. This may lead to a big problem in security that...

read more
Voice over LTE

Voice over LTE

You may not have heard of voice over LTE (VoLTE) technology, but that does notย mean you are not using it! Carriers around the world are deploying this technology to get rid of GSM or CDMA-based circuit networks. The first commercial solution was presented in South...

read more
NarrowBand IoT

NarrowBand IoT

The Internet of Things (IoT) is on everybodyโ€™s mind and analysts expect billions of connected devices in the upcoming years. In order to meet the increasing demands of products for consumers and IoT solutions for companies and business customers, new standards for...

read more