Logo Teldat

NEWS

CE Marking – Certification and Marking

CE Marking – Certification and Marking

The certification of devices equipped with radio technology, together with their corresponding marking, has always been essential to ensure operational safety, electromagnetic compatibility, and the interoperability between systems. These processes were traditionally considered a regulatory obligation to access certain markets. However, due to the rapid growth of...

read more
OT cybersecurity in critical infrastructures

OT cybersecurity in critical infrastructures

Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and popular. We are all familiar with cloud computing, now linked to edge computing, blockchain, the metaverse, AI, etc. However,...

read more
Zero Trust Approach and Unified Cloud Security

Zero Trust Approach and Unified Cloud Security

Introduction In the new paradigm of the connected world, where everything and everyone has access to the Internet, having a totally secure network is difficult to imagine. Today we see how digitization is advancing rapidly, within education, health and government,...

read more
VoIP and the benefits it can bring

VoIP and the benefits it can bring

The term VoIP is an acronym for Voice over Internet Protocol, which means voice over the Internet. It is the technology used to deliver voice and multimedia sessions (such as video) via an Internet Protocol (IP). VoIP phones are therefore physical devices or computer/mobile software designed to transmit voice over the Internet. This allows audio signals from a standard telephone to be converted..

read more
Cyber security in the Railways Industry

Cyber security in the Railways Industry

Cybersecurity has become a real trendy world in everybody’s live either used as a fancy term, to generate confidence associated to high technology topics, or to create panic and generate that sense of fear and urge for protection. We can find this uncomfortable…

read more
MTBF and hardware reliability

MTBF and hardware reliability

This year’s University Entrance Exam (EVAU) for physics in Madrid included a question on atomic decay..

The difficulty could lie not so much in physical concepts as in statistics, and with an equation as simple and seemingly innocent as the exponential: This equation

read more
Ensuring cybersecurity for healthcare research data

Ensuring cybersecurity for healthcare research data

In the wake of the pandemic, nations worldwide are seeking a return to good public health and economic recovery. Any such return can be critically aided by an adequate supply of vaccines which can be administered to millions of people without a hitch. However, the...

read more
The main advantages of OpenStack and its deployment methods

The main advantages of OpenStack and its deployment methods

Due to the growing demand for resources driven mainly by the increasing number of devices with Internet access, it’s hard to find organizations or companies today that aren’t benefitting from the advantages of cloud computing. Acquiring and maintaining expensive...

read more
Digitalizing SASE to enhance network protection in the cloud age

Digitalizing SASE to enhance network protection in the cloud age

SASE – Secure Access Service Edge – is increasingly important as flexible working becomes a standard aspect of corporate IT. Managing cyberthreats is steadily more difficult as the traditional network perimeter disappears. With employees working remotely and new...

read more

Ready to take the Next Step?