CNNs improve image analysis


At the height of the Big Data boom and with ever-increasing demand, Deep Learning is growing and evolving rapidly thanks to all the applications it has to revolutionise AI. Computer vision is one of these fields of…

The Blockchain and the creation of Intelligent Smart Contracts


Blockchain technology emerged through cryptocurrencies, but it has proven to have numerous applications thanks to its effectiveness in managing trust between stakeholders and, above all, the data protection,…

The revolution of SASE solutions for the cloud


Increasingly, companies are trying to grow rapidly through cloud computing, but as is well known, it involves an ever-increasing volume of data, applications, services or users working from outside the company's secure…

MLOps unlocks the key to AI


Currently, there are many machine learning models that do not make it from the test phase to production, which poses a challenge for companies in the Machine Learning field. Many companies are organised in silos and…

Trends in mobile application development


For some time now, it has been well known that having an application developed enriches any company's existing services, simplifies obsolete processes or generates more entertainment. However, companies are quick to…

Vector ITC begins to operate under Softtek name, establishing itself as a Global Digital Solutions company


Vector ITC, a global technology and digital services company, will start operating under the name Softtek, thus concluding the integration process following the announcement of the acquisition by Softtek in 2019. Since…

The path that data collaboration has taken in the cloud


The value of companies' source data must increase and the absence of third party cookies due to new regulations must also be filled. To this end, high-value insights can be generated through mutually beneficial…

The Detection-As-Code (DaC) approach to cybersecurity


Today, manual threat detection processes are becoming obsolete. Detection engineering can advance security operations, especially detection as code (DaC), which is a very suitable approach to threat detection.

New trends in Human-Computer Interaction (HCI)


Human-Computer Interaction emerged in the 1980s with the advent of personal computing, when computers began to appear in offices and homes. This concept started as game units, word processors or numerical aids. Thus,…

How to optimise local SEO and its relationship with voice search?


In recent years, voice search has become a favourite way for users to quickly search for any query on their IoT devices or smartphones. This technology allows searches to be performed by speaking to the devices, rather…