TELDAT Blog

Communicate with us

Why the cybersecurity threat to banks has so significantly increased

Why the cybersecurity threat to banks has so significantly increased

Bank ATM cashpoint machines have always been prime targets for both physical and cyber threats for obvious reasons; they contain large amounts of cash and sensitive customer information. Yet, as the growth in hybrid working and migration to cloud applications has extended bank communications infrastructures to include public Internet paths, new cyber vulnerabilities have also opened up....

read more
Ensuring cybersecurity for healthcare research data

Ensuring cybersecurity for healthcare research data

In the wake of the pandemic, nations worldwide are seeking a return to good public health and economic recovery. Any such return can be critically aided by an adequate supply of vaccines which can be administered to millions of people without a hitch. However, the SARS-CoV-2 vaccine supply chain – which tackles the COVID-19 disease – is rife with logistical complexities. Additionally, the...

read more
The main advantages of OpenStack and its deployment methods

The main advantages of OpenStack and its deployment methods

Due to the growing demand for resources driven mainly by the increasing number of devices with Internet access, it’s hard to find organizations or companies today that aren’t benefitting from the advantages of cloud computing. Acquiring and maintaining expensive hardware and software resources, as well as optimizing these resources in the most optimal way possible, poses a set of challenges that...

read more
Digitalizing SASE to enhance network protection in the cloud age

Digitalizing SASE to enhance network protection in the cloud age

SASE – Secure Access Service Edge – is increasingly important as flexible working becomes a standard aspect of corporate IT. Managing cyberthreats is steadily more difficult as the traditional network perimeter disappears. With employees working remotely and new services being regularly deployed to the cloud, the IT security team is managing thousands of additional end points. Each node...

read more
Towards a Thin CPE

Towards a Thin CPE

It has been more than 10 years since desktop virtualization, generally found under the acronym of VDI technology, Virtual Desktop Infrastructure, was proposed as one of the main technological drivers for providing greater flexibility, efficiency and control to the workstation (PC) – increasingly destined to become “hardwareless” and distributed between multiple devices (as pointed out by the...

read more
What is a cloud-managed SDN network?

What is a cloud-managed SDN network?

One of the consequences of the new digital economy is the increase in the complexity of business network infrastructures during the last decade, both for large companies and SMEs. In response to this new situation, companies have been adopting software-defined networks (SDN) as the hegemonic model of network architecture. This phenomenon, together with the rise of cloud computing has resulted in...

read more
Monitor the performance of queries against databases to eliminate unnecessary costs

Monitor the performance of queries against databases to eliminate unnecessary costs

In our previous article we saw the great advantages of applying Best Programming Practices in SQL Server. We’d like to explore this further, this time focusing on query optimization. SQL is a declarative language: each query declares what we want the database engine to do, but it doesn’t say how. However, it turns out that the how (the plan) is what affects the efficiency of the queries, so it...

read more
Best programming practices for relational databases and cost savings

Best programming practices for relational databases and cost savings

No time is a bad time to plan improvements. Looking for ways to reduce development costs in the cloud is always a good thing. Process response times in Microsoft SQL Server databases are irreparably deteriorating as our data volume grows. Therefore, we must stay one step ahead by improving our infrastructure and the way we act towards them. Everything can always be improved without needing to...

read more
Overcoming entanglements without affecting developers

Overcoming entanglements without affecting developers

Last week’s article described the difficulties faced by developers when working with distributed and/or microservice architectures, often lacking in-depth knowledge about the underlying network technologies that enable different components of the architectures to communicate. As discussed, the main challenges relate to the way in which different services interact with each other rather than to...

read more
floating-i
Contact us