I agree Utilizamos cookies para mejorar la experiencia de navegación del usuario y para estudiar cómo se utiliza nuestro sitio web. Si navega por nuestro sitio web, estará aceptando el uso de las cookies en las condiciones establecidas en la presente política de cookies. Esta política puede ser actualizada, por lo que le invitamos a revisarla de forma regular.
¡HI! If you want to propose us a project, send a mail to info@albatian.com
By: Pedro Robledo, BPM process management expert
Any private or public organization anywhere in the world could be caught by General Data Protection Regulation (GDPR, EU Regulation 2016/679) if it processes personal data relating to EU citizens, has a European presence, or has a website offering goods or services to EU citizens. And it critically affects all personal data, changing the way that entire organizations interact with personally identifiable information. It requires changes in both security and processing as well as in the comprehensive documentation they must maintain ...
(Keep reading)By Juan Emilio Alvárez, Specialist in Digital transformation and BPM
"The Industrial Revolution 4.0 and / or Digital Transformation,”, is already a reality. This transformation implies a reinvention, but, unlike previous transformations, times are critical. Supply and demand vary at Vertiginous speed, and every company has to find its way to success. In this scenario, is it possible to bypass digital transformation 4.0?
The immersion in the "Digital Transformation" has to be a reality, but do not confuse Digital Transformation, with change of technology. Elements such as manufacturing and additive intelligence, robotics, artificial ...
(Keep reading)By Bernardo Ramos, IT security expert
A few weeks ago media around the world alarmed citizens with a "Ransomware" attack which they called "Wannacry". It had blocked lots of computers of some major companies around the world
Shortly afterwards the same media again alarmed us with a new wave of even more sophisticated attacks of the same type. Now they explained that Russia had used a cyber weapon called "Petya" to attack Ukraine with possible unpredictable effects in other countries.
Enterprise executives are not usually concerned with issues such ...
(Keep reading)By Bernardo Ramos, IT security expert
Why should you pay to protect your PC?
How much money are we wasting to protect our PC against computer viruses?
In a world where both the information and the programs used to process it are increasingly in the "cloud" is it still reasonable to spend effort and money on protecting the end point? (Either a PC, a tablet or a Smartphone)
Our computers are becoming more and more a simple tool, such us the pencil we used to use "in the old days", to process our information ...
(Keep reading)By Bernardo Ramos, IT security expert
What is the use of reporting in general?
There are three possible answers:
Of course, everyone will say that the third option is the correct one
But in most cases the true answer is the first one without any further aim
If we want to know if we are doing well in terms of cybersecurity, if we really ...
(Keep reading)