Partner Blog
How to be sure the person is who they say they are
The increase in cyber attacks coupled with people's insecure behaviors, such as the use of weak and equal passwords in several services such as Facebook, Twitter, LinkedIn, Google and Apple, for example, make it necessary to use authentication methods...
5 important steps to organize business processes
For that, it is possible to invest in several tools, such as: the construction of flow charts, internal communication (IC) and business management systems. With these and other changes it will be possible to see a big difference in the performance indicators ....
World Cup 2018: Digital threats in Russia
In the midst of the 2018 World Cup, Russia's Minister of Economic Development, Maxim Oreshkin, estimates that more than half a million tourists will spend around 1.6 billion dollars during the 30-day event. As part of...
What the World Cup of the Future would look like
The FIFA World Cup is always an event that puts the host country to the test in terms of security and logistics for the millions of fans who travel from all over the world to enjoy a unique sporting event. But not only in terms of...
Seminar connect, monitor, and manage your devices with Azure IoT Hub
We present Azure IoT Hub Suite and you will see how easy it is to connect your smart devices and sensors to Microsoft Azure IoT Hub. Webinar Microsoft Azure IoT HUB by ITCollege Speaker: Mario Ganem. Duration: 60 minutes. ...
Secure Digital Transformation: Trusted Identity and Cyber Threat Prevention
To shift the focus and relevance of cybersecurity as part of operational and business processes, incorporating key technologies for secure digital identity and the prevention of fraud and cyber threats, Cisco and VU came together to reflect...
«No solo necesitamos capacidad para construir software, sino habilidades blandas»
From the technology company GeneXus, founded more than 25 years ago, three other companies were created over the years: Genexus Consulting (dedicated to customized consulting), K2B (software solutions for the business and health areas) and GX Vision (software...
Towards equity: science, technology, engineering, and mathematics
This working group is coordinated by the Gender Advisory Office of the Office of Planning and Budget and was formed the same year within the framework of the SAGA-UNESCO International Project. In this Women's Month, dedicated to promoting equal opportunities in the field of gender equality, the...
Myths and Truths about Mobile Biometric Authentication
It is a reality that, in these times, our face, voice and fingerprints are becoming stellar factors in the care of the citizen's identity. Whether through the local readers of each device or through independent software of the system, our face, voice and fingerprints are...
Why is SaaS a dream come true for ISVs and DevOps not so much?
One of the larger rooms in the office had a CD replication machine. Years ago, when CDs were part of everyday life, I had worked for ODME , a leading producer of optical disc machines, so I was surprised when I recognized one in...
A brief cognitive tour of some forgotten futures
Back when Sputnik was still presented as an alternative to Reader's Digest Selections, my old man gave me one of my first technology texts: "The ABCs of Cybernetics", by V. Kasatkin, ideal reading for the bus if you'd already completed one of the...
The dangers of hyper-connected objects
In the midst of a digital transformation, the Internet of Things (IoT) is not just another term that describes the technology that connects objects and devices to the web to obtain additional information. It is a reality that is quietly gaining more and more...
Connect