Security
Scroll to see more
6G, the way for the fusion of the digital and physical worlds
6G is the name of the sixth generation of cellular networks and will provide ubiquitous...
Securing GPS data using Geo-indistinguishability
Today we can find monuments, restaurants or shops in one click, but are these technologies...
Location data: can they be really anonymous?
During the following minute thousands of applications will request millions of people to reveal their...
GRD Tech: Industry 4.0, the industrial revolution of the entire value chain
This month at GRD Tech we talk to you about Industry 4.0, the industrial revolution...
Deploying Apache Airflow with Docker Compose
Apache Airflow is an open-source tool to programmatically author, schedule and monitor workflows. It’s a...
Data anonymization: how does it protect us?
How can we guarantee that our data is really anonymous or that there is no...
5 key trends from CES 2019 to keep in mind
After five intense days and 10,600 kilometres, our team moved to the city Elvis sang...
ElevenPaths & Gradiant work together on users’ biometric verification on the encrypted domain
Both organizations have collaborated through TEGRA cybersecurity center to develop a technology for user's biometric...
Pepe’s story: 10 tips to be safe on Internet
On the occasion of the Safer Internet Day, Gradiant would like to tell you the...
Cybersecurity: data analytics to the rescue
How can data analytics be used to improve cibersecurity?