Valida allows an effective response in the fight against document and identity fraud. This solution is being used by companies from financial sector, banking, insurance and public organizations.
We are immersed in an environment in which we continually hear about Industry 4.0 and the application of technologies such as IoT or Artificial Intelligence to solve multiple problems and use cases that may arise in a manufacturing environment. Typical examples may be defect reduction and prescription of industrial process parameters, logistics optimization, or even […]
The possibilities offered by 5G technologies are practically endless, but it is necessary to know from the inside all the advantages that these technologies provide to companies. The work we are developing within the framework of the Open-VERSO National Network of Excellence allows us to specialize in 5G enabling technologies.
Today we can find monuments, restaurants or shops in one click, but are these technologies safe for our privacy? In this post we will review Geo-indistinguishability, one of the anonymization techniques used to anonymize the geographic location of an individual.
How many times have we heard about 5G? A new technology that will change the way we communicate, some say. We explain it in this article.
In the series #WeAreCommitment, we’re talking about how the work we do every day at Gradiant contributes directly to reducing poverty and hunger, improving healthcare, creating new jobs, mitigating climate change, improving energy efficiency and making cities and communities sustainable.
Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a scalable, flexible, extensible and elegant workflow orchestrator, where workflows are designed in Python and monitored with a web UI.
We are experiencing the rise of a set of methods, algorithms and applications under the label of Artificial Intelligence. But what is artificial intelligence? What does it really consist of? In this post we will try to answer the concepts and bases of AI technology
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
La biometría y las tecnologías biométricas se configuran como mecanismo de identificación y control de acceso en multitud de situaciones.
Artículo sobre el uso de la biometría facial: usabilidad, seguridad, robustez contra los ataques de suplantación de identidad (spoofing) y privacidad del usuario entre otros.
Las tecnologías de autenticación avanzadas, como las biométricas, aumentan la confianza de sus consumidores y mejoran la experiencia del usuario al proporcionar métodos de autenticación confiables, seguros y sobre todo, fáciles para el usuario.