In the series #WeAreCommitment, we’re talking about how the work we do every day at Gradiant contributes directly to reducing poverty and hunger, improving healthcare, creating new jobs, mitigating climate change, improving energy efficiency and making cities and communities sustainable.
During the following minute thousands of applications will request millions of people to reveal their location. However, these data are extremely sensitive, so their processing needs to be done to avoid compromise the privacy of the users.
We live in a society marked by the digital transformation in which more and more procedures are being transferred to an online environment. From a loan application to renting a vehicle or betting on our favourite team, the options, facilities and advantages that the digital world offers us are endless but… are they safe? The […]
The adoption of new technologies is forcing companies to innovate in cybersecurity to cope with the development of new threats. When fraud and identity theft are presented as the great enemies of the digital age, technology is their best ally.
Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a scalable, flexible, extensible and elegant workflow orchestrator, where workflows are designed in Python and monitored with a web UI.
Everyone is talking about 5G mobile technology and how they will transform our lives… but how will 5G really affect us? Will it have such an impact on our daily lives?
How can we guarantee that our data is really anonymous or that there is no risk to privacy? The answer to this question is simple: absolute guarantees do not exist. That is why it is so important to invest in R&D to advance in this type of techniques.
We are experiencing the rise of a set of methods, algorithms and applications under the label of Artificial Intelligence. But what is artificial intelligence? What does it really consist of? In this post we will try to answer the concepts and bases of AI technology
It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our own software solving effectively frequently used tasks so that we do not need to reinvent the wheel.
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
Electro Optical (EO) sensors have been core payloads for aerial systems for years. Current sensor technology offers mature products not only in the visible (VIS) and near infrared (NIR) bands of the optical spectrum, but also in others such as long wave, medium wave and short wave infrared (LWIR, MWIR, SWIR). Moreover, advances in the […]
A Remotely Piloted Aircraft or RPA is, in general, an aircraft able to fly autonomously. The aircraft is controlled by a pilot on land or by an on board computer. The fact the pilot is not on the aircraft compel us to make available another different technical mechanisms to supply that need, such as […]