Connect

Join us Contact

Blog

How to be sure the person is who they say they are

How to be sure the person is who they say they are

The increase in cyber attacks coupled with people's insecure behaviors, such as the use of weak and equal passwords in several services such as Facebook, Twitter, LinkedIn, Google and Apple, for example, make it necessary to use authentication methods...

5 important steps to organize business processes

5 important steps to organize business processes

For that, it is possible to invest in several tools, such as: the construction of flow charts, internal communication (IC) and business management systems. With these and other changes it will be possible to see a big difference in the performance indicators ....

World Cup 2018: Digital threats in Russia

World Cup 2018: Digital threats in Russia

In the midst of the 2018 World Cup, Russia's Minister of Economic Development, Maxim Oreshkin, estimates that more than half a million tourists will spend around 1.6 billion dollars during the 30-day event. As part of...

What the World Cup of the Future would look like

What the World Cup of the Future would look like

The FIFA World Cup is always an event that puts the host country to the test in terms of security and logistics for the millions of fans who travel from all over the world to enjoy a unique sporting event. But not only in terms of...

Towards equity: science, technology, engineering, and mathematics

Towards equity: science, technology, engineering, and mathematics

This working group is coordinated by the Gender Advisory Office of the Office of Planning and Budget and was formed the same year within the framework of the SAGA-UNESCO International Project. In this Women's Month, dedicated to promoting equal opportunities in the field of gender equality, the...

Myths and Truths about Mobile Biometric Authentication

Myths and Truths about Mobile Biometric Authentication

It is a reality that, in these times, our face, voice and fingerprints are becoming stellar factors in the care of the citizen's identity. Whether through the local readers of each device or through independent software of the system, our face, voice and fingerprints are...

A brief cognitive tour of some forgotten futures

A brief cognitive tour of some forgotten futures

Back when Sputnik was still presented as an alternative to Reader's Digest Selections, my old man gave me one of my first technology texts: "The ABCs of Cybernetics", by V. Kasatkin, ideal reading for the bus if you'd already completed one of the...

The dangers of hyper-connected objects

The dangers of hyper-connected objects

In the midst of a digital transformation, the Internet of Things (IoT) is not just another term that describes the technology that connects objects and devices to the web to obtain additional information. It is a reality that is quietly gaining more and more...

Conditions for the use of Cuti's Blog
  1. Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
  2. Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
  3. Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
  4. Third-party content must have sufficient rights for publication.
  5. Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.