Everyone is talking about 5G mobile technology and how they will transform our lives… but how will 5G really affect us? Will it have such an impact on our daily lives?
How can we guarantee that our data is really anonymous or that there is no risk to privacy? The answer to this question is simple: absolute guarantees do not exist. That is why it is so important to invest in R&D to advance in this type of techniques.
We are experiencing the rise of a set of methods, algorithms and applications under the label of Artificial Intelligence. But what is artificial intelligence? What does it really consist of? In this post we will try to answer the concepts and bases of AI technology
It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our own software solving effectively frequently used tasks so that we do not need to reinvent the wheel.
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
Electro Optical (EO) sensors have been core payloads for aerial systems for years. Current sensor technology offers mature products not only in the visible (VIS) and near infrared (NIR) bands of the optical spectrum, but also in others such as long wave, medium wave and short wave infrared (LWIR, MWIR, SWIR). Moreover, advances in the […]
A Remotely Piloted Aircraft or RPA is, in general, an aircraft able to fly autonomously. The aircraft is controlled by a pilot on land or by an on board computer. The fact the pilot is not on the aircraft compel us to make available another different technical mechanisms to supply that need, such as […]
Last week San Francisco’s Moscone Center hosted the world’s largest professional meeting on ICT security. More than 45,000 expert and visitors attended the RSA Conference 2018 to learn about new policies, practices, advances and technological solutions that are being developed to deal with current challenges facing the sector and to anticipate future ones. As it […]
¿Recordáis a nuestro amigo Pepe? Ha vuelto para que podamos aprender de su experiencia con las redes sociales y estar más seguros en este mundo de internet. Entra para conocer la historia de nuestro querido amigo Pepe.
Convinced sportswoman, this woman from Lalín (Galicia) settled in Vigo, works as a researcher and developer in the Advanced Communications department at Gradiant.
When in 1984, William Gibson wrote Neuromancer, years before world wide web was born, he was not only able to anticipate to hyper connected world using the term “cyberspace”, but he also foresaw cybersecurity associated problems. In the novel, Casi, the antihero and hacker (cyber cowboy in Gibson’s text) is hired to break the security […]
ElevenPaths y Microsoft integran, gracias a la tecnología Gradiant, Azure Key Vault con la plataforma SealSign. El acuerdo proporciona un servicio de firma digital en servidor y custodia de certificados basado en HSM con altos niveles de seguridad, escalabilidad y rendimiento.