Blog
World Cup 2018: Digital threats in Russia
In the midst of the 2018 World Cup, Russia's Minister of Economic Development, Maxim Oreshkin, estimates that more than half a million tourists will spend around 1.6 billion dollars during the 30-day event. As part of...
What the World Cup of the Future would look like
The FIFA World Cup is always an event that puts the host country to the test in terms of security and logistics for the millions of fans who travel from all over the world to enjoy a unique sporting event. But not only in terms of...
Seminar connect, monitor, and manage your devices with Azure IoT Hub
We present Azure IoT Hub Suite and you will see how easy it is to connect your smart devices and sensors to Microsoft Azure IoT Hub. Webinar Microsoft Azure IoT HUB by ITCollege Speaker: Mario Ganem. Duration: 60 minutes. ...
Secure Digital Transformation: Trusted Identity and Cyber Threat Prevention
To shift the focus and relevance of cybersecurity as part of operational and business processes, incorporating key technologies for secure digital identity and the prevention of fraud and cyber threats, Cisco and VU came together to reflect...
«No solo necesitamos capacidad para construir software, sino habilidades blandas»
From the technology company GeneXus, founded more than 25 years ago, three other companies were created over the years: Genexus Consulting (dedicated to customized consulting), K2B (software solutions for the business and health areas) and GX Vision (software...
Towards equity: science, technology, engineering, and mathematics
This working group is coordinated by the Gender Advisory Office of the Office of Planning and Budget and was formed the same year within the framework of the SAGA-UNESCO International Project. In this Women's Month, dedicated to promoting equal opportunities in the field of gender equality, the...
Myths and Truths about Mobile Biometric Authentication
It is a reality that, in these times, our face, voice and fingerprints are becoming stellar factors in the care of the citizen's identity. Whether through the local readers of each device or through independent software of the system, our face, voice and fingerprints are...
Why is SaaS a dream come true for ISVs and DevOps not so much?
One of the larger rooms in the office had a CD replication machine. Years ago, when CDs were part of everyday life, I had worked for ODME , a leading producer of optical disc machines, so I was surprised when I recognized one in...
A brief cognitive tour of some forgotten futures
Back when Sputnik was still presented as an alternative to Reader's Digest Selections, my old man gave me one of my first technology texts: "The ABCs of Cybernetics", by V. Kasatkin, ideal reading for the bus if you'd already completed one of the...
The dangers of hyper-connected objects
In the midst of a digital transformation, the Internet of Things (IoT) is not just another term that describes the technology that connects objects and devices to the web to obtain additional information. It is a reality that is quietly gaining more and more...
China positions itself as the most advanced market in digital payments
Fanatical about running and with a major challenge looming, in Shenzhen I went down to the hotel gym. After an hour and a half of intense exercise, I saw that next to the entrance there was a fridge with a sports drink that I knew I didn't have in my room, so I went down to the...
The mission to China in retrospect
We traveled with a delegation of more than 45 people from the ICT industry in Uruguay, joined by Diego Sastre and Ignacio Duarte, members of the board of Pyxis. The main objective was to promote cooperation and investment in the sector. From Pyxis,...
Conditions for the use of Cuti's Blog
- Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
- Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
- Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
- Third-party content must have sufficient rights for publication.
- Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.
Connect