Blog
Migrate expands its operations to Paraguay
We are present in the Brazilian and Uruguayan market with more than 500 partner companies, software developers, reaching more than 20,000 final issuers. With the InvoiCy Platform we are expanding our operations, starting to serve Paraguay, Uruguay and...
What is a Digital Twin? Advantages of applying it to any business
Digital Twin is the ultimate representation of the next technological leap: the union of the physical world with intelligent virtual models, which are even considered pioneers in what we know as the Fourth Industrial Revolution. Born from the concept of...
How to invest in Cybersecurity and save at the same time?
There are several alternatives in how to comply with cybersecurity requirements, as not all organizations have the obligation, need or ability to consider the responsibilities and operations related to cybersecurity, as well as the...
How to be sure the person is who they say they are
The increase in cyber attacks coupled with people's insecure behaviors, such as the use of weak and equal passwords in several services such as Facebook, Twitter, LinkedIn, Google and Apple, for example, make it necessary to use authentication methods...
5 important steps to organize business processes
For that, it is possible to invest in several tools, such as: the construction of flow charts, internal communication (IC) and business management systems. With these and other changes it will be possible to see a big difference in the performance indicators ....
World Cup 2018: Digital threats in Russia
In the midst of the 2018 World Cup, Russia's Minister of Economic Development, Maxim Oreshkin, estimates that more than half a million tourists will spend around 1.6 billion dollars during the 30-day event. As part of...
What the World Cup of the Future would look like
The FIFA World Cup is always an event that puts the host country to the test in terms of security and logistics for the millions of fans who travel from all over the world to enjoy a unique sporting event. But not only in terms of...
Seminar connect, monitor, and manage your devices with Azure IoT Hub
We present Azure IoT Hub Suite and you will see how easy it is to connect your smart devices and sensors to Microsoft Azure IoT Hub. Webinar Microsoft Azure IoT HUB by ITCollege Speaker: Mario Ganem. Duration: 60 minutes. ...
Secure Digital Transformation: Trusted Identity and Cyber Threat Prevention
To shift the focus and relevance of cybersecurity as part of operational and business processes, incorporating key technologies for secure digital identity and the prevention of fraud and cyber threats, Cisco and VU came together to reflect...
«No solo necesitamos capacidad para construir software, sino habilidades blandas»
From the technology company GeneXus, founded more than 25 years ago, three other companies were created over the years: Genexus Consulting (dedicated to customized consulting), K2B (software solutions for the business and health areas) and GX Vision (software...
Towards equity: science, technology, engineering, and mathematics
This working group is coordinated by the Gender Advisory Office of the Office of Planning and Budget and was formed the same year within the framework of the SAGA-UNESCO International Project. In this Women's Month, dedicated to promoting equal opportunities in the field of gender equality, the...
Myths and Truths about Mobile Biometric Authentication
It is a reality that, in these times, our face, voice and fingerprints are becoming stellar factors in the care of the citizen's identity. Whether through the local readers of each device or through independent software of the system, our face, voice and fingerprints are...
Conditions for the use of Cuti's Blog
- Its use may not be contrary to the rules of the Oriental Republic of Uruguay, which means that, among others, publications of discriminatory, violent, pornographic content, or that damage the property, image or honor of persons may not be made.
- Any User may report the existence of inappropriate content. Cuti may remove -at its sole discretion- these contents.
- Cuti may provide copies of the contents, even those containing personal data, to any police, judicial or administrative authority upon request.
- Third-party content must have sufficient rights for publication.
- Users of the Blog exonerate Cuti from any civil, commercial, labor, tax, criminal, administrative or any other liability resulting from their actions related to the contents of this Blog.
Connect