Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a scalable, flexible, extensible and elegant workflow orchestrator, where workflows are designed in Python and monitored with a web UI.
How can we guarantee that our data is really anonymous or that there is no risk to privacy? The answer to this question is simple: absolute guarantees do not exist. That is why it is so important to invest in R&D to advance in this type of techniques.
We are experiencing the rise of a set of methods, algorithms and applications under the label of Artificial Intelligence. But what is artificial intelligence? What does it really consist of? In this post we will try to answer the concepts and bases of AI technology
After five intense days and 10,600 kilometres, our team moved to the city Elvis sang to for showcasing new Gradiant’s solution to prevent document fraud. They tell us what happened at Las Vegas Convention Center (LVCC) and what technology trends we should be aware of during 2019
Born in Allariz, our colleague is a telecommunications engineer and played in the Galician basketball team. In addition, Antía plays the bagpipe and in her free time enjoys nature and practices yoga.
With more than 1600 attendees and more than 90 speakers for two days, this edition had 4 simultaneous presentation tracks on technology and business around Big Data. Our colleagues Rafael Martínez and Agustín Cañas brief us some of the keytrends in Big Data and Artificial Intelligence fields.
Connectivity is one of the main challenges for IoT devices and narrowband-IoT (NB-IoT) is a technology that allows us to connect devices we use everyday to the Internet, devices that require small amounts of data to be sent very infrequently, like a few times a day.
Aware of the importance that people have in the change towards Industry 4.0, we deepen in the relevance of education as a mechanism of adaptation of workers and in the new necessary skills such as lifelong learning, in which Gradiant is currently working.
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
Steve Jobs’ official biography (Isaacson, 2011) reveals that in a meeting between him and Barack Obama, the educational situation in the country was approached from a critical point of view. Jobs referred to an “old-fashioned” education system and the great potential for improvement of study materials thanks to new technologies: “All books, learning materials […]
Last week San Francisco’s Moscone Center hosted the world’s largest professional meeting on ICT security. More than 45,000 expert and visitors attended the RSA Conference 2018 to learn about new policies, practices, advances and technological solutions that are being developed to deal with current challenges facing the sector and to anticipate future ones. As it […]
When in 1984, William Gibson wrote Neuromancer, years before world wide web was born, he was not only able to anticipate to hyper connected world using the term “cyberspace”, but he also foresaw cybersecurity associated problems. In the novel, Casi, the antihero and hacker (cyber cowboy in Gibson’s text) is hired to break the security […]