Logo Teldat

NEWS

CE Marking – Certification and Marking

CE Marking – Certification and Marking

The certification of devices equipped with radio technology, together with their corresponding marking, has always been essential to ensure operational safety, electromagnetic compatibility, and the interoperability between systems. These processes were traditionally considered a regulatory obligation to access certain markets. However, due to the rapid growth of...

read more
5G Networks – Cybersecurity Solutions and Threats

5G Networks – Cybersecurity Solutions and Threats

The arrival of 5G networks is set to shake up global connectivity, delivering unprecedented speeds, the ability to connect a vast number of devices, and ultra-low latency. However, this new technology also introduces a series of cybersecurity challenges. This blog...

read more
Dead Reckoning on how to improve road transport navigation

Dead Reckoning on how to improve road transport navigation

Dead Reckoning is the process of calculating the current position of an object based on estimates. Despite its origins in seafaring, it can have a significant impact on road transport. In a world dominated by GNSS technologies, understanding the implications of Dead...

read more
Developing a Robust Disaster Recovery Plan in the Cloud

Developing a Robust Disaster Recovery Plan in the Cloud

In an increasingly digital world, businesses depend on cloud-based systems for everything from data storage to critical applications. While the cloud offers significant benefits—such as scalability, flexibility, and cost efficiency—it also presents new challenges in...

read more
Quadruple Extortion in Ransomware: The Evolution of Cybercrime

Quadruple Extortion in Ransomware: The Evolution of Cybercrime

The advance of the Internet and new technologies has led to major developments in companies and organizations, but it has also led to a large number of threats in the field of cybersecurity. The Evolution of Ransomware to Quadruple Extortion Ransomware has emerged as...

read more
The Importance of Cybersecurity in the Healthcare Sector

The Importance of Cybersecurity in the Healthcare Sector

In recent decades, the healthcare sector has undergone a profound digital transformation, enhancing efficiency in patient care and information management. However, this shift has also made healthcare organizations more vulnerable to cyberattacks. The systems handle...

read more
On-board railway technology developments focusing on AI

On-board railway technology developments focusing on AI

In most productive sectors, artificial intelligence (AI) has become a key in transforming processes and optimizing business resources, making them more agile and efficient. This path towards modernization revolutionizes our life habits, as well as the technology...

read more
About VLANs on Switches

About VLANs on Switches

Continuing the series of blogs posts on the most representative technologies to consider when selecting switches, this time we look at VLAN technology. VLANs arose from the need to isolate different stations operating on the same physical local network.  In addition,...

read more
The role of communications in the mining sector

The role of communications in the mining sector

In complex mine scenarios, where machinery roars, dust rises and darkness reigns, communications become essential tool to shine light on safety and efficiency. Not only that, but they support coordination, decision-making and the well-being of workers. For instance,...

read more
Switches: Link Aggregation Techniques

Switches: Link Aggregation Techniques

Continuing our series of blog posts on the most representative technologies to consider when selecting switches, we will now address  port & link aggregation technologies.   Historical background on port & link aggregation In the evolution of Ethernet...

read more
Observability in IT networks

Observability in IT networks

In the ever-changing world of IT networks, observability has become crucial to ensure computer networks run safely and efficiently. The ability to understand and monitor the internal states of a system in real time has become essential in areas as wide-ranging as...

read more
Understanding the technology behind heat pipes

Understanding the technology behind heat pipes

Heat pipes transfer heat on electronic devices & industrial applications, using the heat transition principle, to transfer to heat sinks within a cooling system. Heat pipes have clear advantages over other heat dissipation methods. What are heat pipes? Heat pipes...

read more
The vehicle of the future

The vehicle of the future

One day, Henry Ford said: "If I had asked people what they wanted, they would have said faster horses". Twenty years later, horses had disappeared from the roads. Today, vehicles come with advanced safety, alternative fuels, and intelligent driving assistance...

read more
Security attacks on Supply Chains

Security attacks on Supply Chains

In the digital age, supply chains are essential for the smooth functioning of businesses and the economy at large. Businesses increasingly rely on an interconnected ecosystem of suppliers, software and services to function. However, in recent years, we have witnessed...

read more

Ready to take the Next Step?