In this ORM I killed myself

An ORM can be one of the best tools at the start of a project, and it can become a nightmare by maintaining it. We analyze the main problems that…

Trends in mobility and internet in 2019 and its evolution compared to 2018: operating systems, browsers and search engines

Very close to a new year we answer the question, how is the behavior of internet users regarding the main tools, such as browsers, search engines and operating systems?

Is it legal to use the electronic signature?

In the process of digital transformation, one of the first questions we ask when assessing a change from the traditional system to an electronic system for signing documents and contracts…

7 stamps to trust a digital services company

Undoubtedly, something that leads us to strengthen our confidence in a particular brand is the recognition behind it as a result of its good work and professionalism over time. What…

How to evade legal violations with time stamping

Time stamps provide great value from the legal point of view to the digital signature. How is this stamping done? In what documents can be made? What legal violations can…

Personal data: which are your rights and obligations?

More than ever we are aware of the value of our personal information, but do we know what obligations and rights protect us about our data? We analyze in this…

Management, audit and signature delegation using certificate in the cloud

In the digital world to carry out business or personal procedures it is essential to have an electronic certificate to guarantee the security of your digital identity.

The most popular “Micro” Java Frameworks

Resumen 1. SparkJava2. Javalin3. Ninja4. Micronaut5. Dropwizard6. SpringBoot7. RapidoidSummary:Conclusion With the rise of microservices and the billing model of cloud services, we are in need of analyzing the environments in…

The use of the electronic stamp in the Public Administration

What is an electronic stamp and how does it help make life easier for companies that work continuously with governments and public entities? Next, we immerse ourselves in this very…

The “bricks” of digital identity

How do you manage to build actions that allow you to establish authentication with full guarantees? Digital identity is as important as physics and thanks to it we can expedite…

Spain and laws 39 and 40/2015: the digital transformation of administrations

Spanish legislation has just been updated to continue evolving in electronic administration. Do you want to know how these changes will affect you? In this article we will analyze the…

5 ways to protect your digital identity

In the era of communications, it is as important to properly preserve our physical identity as the one we have on the internet. More so with the constant cyber-attacks suffered…

Ethical hacking: identification of services with nmap

In the previous post of ethical hacking we briefly explain various options to get an enumeration of IP addresses and subdomains when performing an ethical hacking process. If you liked…

3 use cases of the digital signature in retail

Does the question sound to you: how do I adapt my company to the digital era so as not to lose competitive advantage? If the answer is yes and your…