6G is the name of the sixth generation of cellular networks and will provide ubiquitous wireless intelligence. The most widespread vision of 6G is based on the goal of creating a “reality” where the digital (or virtual) and physical worlds as we know them today merge. 6G is expected to be available in the early 2030s.
If we think about the information that large companies such as Facebook or Amazon handle daily, probably one concept will come to mind: Big Data. With the increase of computational power and the decrease of storage costs, and the recent developments in fields such as cloud computing or the Internet of Things, Big Data […]
Today we can find monuments, restaurants or shops in one click, but are these technologies safe for our privacy? In this post we will review Geo-indistinguishability, one of the anonymization techniques used to anonymize the geographic location of an individual.
It is well known that the majority of countries and entities in the Western world agreed more than five years ago to join forces against some of the most harmful scourges in the world, in what they called the 2030 Sustainable Development Goals. Among them, poverty might be the one that is most urgent, and […]
During the following minute thousands of applications will request millions of people to reveal their location. However, these data are extremely sensitive, so their processing needs to be done to avoid compromise the privacy of the users.
This month at GRD Tech we talk to you about Industry 4.0, the industrial revolution of the entire value chain. Where do we stand? What challenges will companies have to face?
Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a scalable, flexible, extensible and elegant workflow orchestrator, where workflows are designed in Python and monitored with a web UI.
How can we guarantee that our data is really anonymous or that there is no risk to privacy? The answer to this question is simple: absolute guarantees do not exist. That is why it is so important to invest in R&D to advance in this type of techniques.
With spring just around the corner we jumped into the pool with a new blog section. At GRD Tech, our colleagues will talk to about the most disruptive technologies and trends of the moment, besides telling us first-hand about the technologies we are developing and the problems they solve. In this first publication, our colleagues […]
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user’s biometric verification in the encrypted domain using SPED-signature techniques.
Last week San Francisco’s Moscone Center hosted the world’s largest professional meeting on ICT security. More than 45,000 expert and visitors attended the RSA Conference 2018 to learn about new policies, practices, advances and technological solutions that are being developed to deal with current challenges facing the sector and to anticipate future ones. As it […]
On the occasion of the Safer Internet Day, Gradiant would like to tell you the story of our friend Pepe and his experience on the Internet