Logo Teldat
Attacks on Artificial Intelligence: Threats and defenses

Attacks on Artificial Intelligence: Threats and defenses

In this era of technology and digitalization, Artificial Intelligence model (AI) has become a powerful, widely used tool in various fields. From healthcare to cybersecurity to speech recognition, AI has revolutionized our interactions with technology and proven its potential in improving the efficiency and accuracy of automated tasks. But as AI becomes more prevalent, so too do concerns about...

read more
6G technology – Next Generation Networks

6G technology – Next Generation Networks

Itโ€™s hard to figure out what we can achieve with the technology that will one day replace 5G. Technological advances are growing at an exorbitant rate and there seems to be no end to human imagination. We have already stated that the 5G paradigm will reshape the world in which we live, allowing us to create networks of almost unlimited bandwidth, with extraordinary capacity and next-to-no...

read more
Artificial Intelligence applied to Networking or SD-WAN 2.0

Artificial Intelligence applied to Networking or SD-WAN 2.0

The complexity of communications networks, like SD-WAN, has undoubtedly been increasing in recent years, and itโ€™s a trend that shows no signs of changing any time soon. We see this with the increased use of public and private clouds, hybrid clouds, and multiclouds, as well as the exponential rise in new applications and IoT devices, not to mention the huge (mixed) networks formed by private and...

read more
Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity

Artificial Intelligence with Machine Learning and Deep Learning applied to Cybersecurity

Artificial Intelligence - AI and cybersecurity are two terms that are becoming increasingly popular in today's digital age. While AI refers to the simulation of human intelligence in machines that are capable of performing tasks such as learning, decision making, and problem solving, cybersecurity refers to the protection of digital information and systems from unauthorized access, theft, and...

read more
OT cybersecurity in critical infrastructures

OT cybersecurity in critical infrastructures

Now that mass and social media are booming, it is normal for marketing to take over and for technological terms to become more trivialized and popular. We are all familiar with cloud computing, now linked to edge computing, blockchain, the metaverse, AI, etc. However, the concept that has taken this year by storm is cybersecurity, and it would be unwise not to analyze it in depth.    ...

read more
Predictive maintenance in elevators via IoT

Predictive maintenance in elevators via IoT

During 2021, the growth of the IoTย market has stimulated the creation of new formulas for the application of this technology. Moreover, according to some analystsโ€™ projections, the market could grow to as much asย 11 trillion USD by the year 2025. To give you an idea, this figure is roughly equivalent to the combined GDP of Germany, Japan and France. For manufacturers, the constantly-evolving IoT...

read more