What is my IP
What is my IP

Search results: cter

Results (7)
Approximately 7 results of cter

Privacy Policy
Privacy Policy

Esta política de privacidad aplica a todos los contenidos de este sitio web y que sean publicados por Dommia Design Studio. Si usted tiene alguna consulta sobre cómo usamos su información personal, por favor contacte con nuestro responsable de privacidad en [email protected]. Según lo establecido en el RGPD (Reglamento (UE) 2016/679), les proporcionamos la Información Detallada de Protección de Datos que se expone a continuación: Responsable: Dommia Design StudioRazón Social: Dommia Design Studio SLC.I.F.: B-66440581Dirección: c/ Lepant, 326, Entlo, Desp 3 - 08025 - BarcelonaTeléfono: 936 241 455Correo Electrónico: [email protected] Inscrita en el Registro Mercantil de Barcelona Tomo: 44619, Folio: 176, Hoja: 461387, Inscripción: 1 Información que recopilamos y con qué objetivo Esta sección detalla la información que podemos recoger sobre usted. Explicamos por qué y cómo lo utilizamos en secciones posteriores. Información que obtenemos a través de cookies y herramientas similares Utilizamos cookies (y tecnologías similares) y herramientas de análisis en nuestros sitios para recopilar información sobre usted. Esta información se puede utilizar para mejorar el rendimiento del sitio y mejorar la experiencia de usuario. Proporcionamos información detallada sobre cookies y tecnologías similares dentro de nuestra Política de Privacidad; algunos ejemplos incluyen: Su ubicación: utilizamos cookies para mostrar información del lugar más relevante para su ubicación. Su uso: utilizamos cookies para entender como nuestros clientes utilizan nuestros sitios. El dispositivo: utilizamos cookies para entender el tipo de dispositivo que está utilizando para mostrarle la mejor versión del sitio. Si desea administrar sus cookies, siga las instrucciones de la sección "Cómo gestionar las cookies" dentro de nuestra Política de Privacidad. Información que obtenemos a través del formulario de contacto Datos de contacto: nombre y correo electrónico. Web Beacons Utilizamos web beacon en nuestras páginas web y nuestros correos electrónicos. Cuando enviamos correos electrónicos a los miembros del boletín de noticias, podemos hacer un seguimiento del comportamiento como quien abrió los correos electrónicos y quien hizo clic en los enlaces. Esto nos permite medir el rendimiento de nuestras campañas de correo electrónico y mejorar nuestras características para determinados segmentos de miembros. Fundamentos legales para el procesamiento Solo tratamos información personal cuando tenemos su consentimiento de usuario: es decir, cuando nos ha dado permiso explícito para procesar información personal para un fin determinado. Por ejemplo, si completa uno de nuestros formularios de comunicación, le solicitaremos su consentimiento si quisiéramos utilizar su información personal para cualquier otro propósito. Usted tiene el derecho de retirar este consentimiento en cualquier momento. Puede administrar sus preferencias contactando con nuestro Delegado de Protección de Datos en [email protected]. ¿Cómo utilizamos su información personal? Recopilamos información personal por una razón principal, para mejorar y mantener el rendimiento de nuestro sitio web y poder brindarle la mejor experiencia de usuario posible. Recopilamos información personal por dos motivos principales: Mejorar y mantener el rendimiento: para proporcionarle la mejor experiencia de usuario posible, debemos asegurarnos de que nuestros productos y servicios funcionan como deberían ser. Comunicar cambios y ofertas de productos: queremos que obtenga el máximo rendimiento de nuestros productos o servicios, incluyendo mostrar nuestros últimos contenidos y boletines informativos. Puede cambiar sus preferencias en cualquier momento contactando a nuestro oficial de privacidad a [email protected]. ¿Con quién compartimos su información personal? No divulgamos su información personal a ningún tercero a menos que lo exijan las leyes aplicables, órdenes judiciales u otros procesos legales válidos. ¿Cuánto tiempo conservamos su información personal? Un resumen de la duración de su información personal: Categoría de datosEjemploPeríodo RetenciónJustificación del Período Comercial Clientes Hasta 5 años después de la resolución de cualquier relación comercial Para informar de nuestros productos y servicios Comercial Formulario de contacto Hasta 5 años después de la resolución de cualquier relación comercial Para informar de las peticiones realizadas por el usuario Marketing Newsletter Hasta que exprese su negativa a que sea enviada Para informar de nuestros productos y servicios Los datos se almacenarán el tiempo estrictamente necesario exclusivamente para el desempeño de sus competencias legalmente establecidas. A veces es necesario que guardemos su información personal por períodos más largos, por ejemplo: Si existe un requisito legal para retenerlo; Si requerimos la información por razones legales o existe una necesidad legítima para que la retengamos; Para garantizar que no nos comuniquemos con usted si nos ha pedido que no lo hagamos. ¿Cómo mantenemos su información personal segura? Contamos con las medidas de seguridad técnicas y organizativas adecuadas para garantizar que la información de nuestros usuarios esté protegida contra el acceso, uso, alteración o pérdida no autorizados o accidentales. Sus derechos Según las leyes de protección de datos, tiene derechos en relación con sus datos personales que gestionamos. Estos derechos incluyen: El derecho de oposición al márquetin directo; El derecho de acceso a los datos personales que procesamos sobre usted; El derecho a solicitar la eliminación de sus datos personales; El derecho a solicitar la rectificación de sus datos personales. Puede ejercer estos derechos contactando a nuestro oficial de Privacidad en [email protected]. ¿Dónde se aplica esta política de privacidad? La información personal recopilada por el CLIENTE. Nuestro sitio web puede contener enlaces a sitios web de terceros que no están sujetos a esta política de privacidad. No somos responsables de su contenido, uso de información personal o prácticas de seguridad. Si tiene una consulta sobre el tratamiento de su información personal, comuníquese con nuestro oficial de Privacidad en [email protected]. Cambios en esta política de privacidad Esta política es efectiva desde el 24/05/2018. Cualquier cambio que hagamos a esta política de privacidad se publicará en esta página, explicitando la fecha del último cambio.

[ ... ]

WiFi Security: Assessment of threats in wireless networks
WiFi Security: Assessment of threats in wireless networks
08/03/2024

Wifi connectivity has gone from being limited to restricted environments to becoming omnipresent in virtually every aspect of our daily lives. The ability to connect to the Internet from anywhere, be it at home, in a café, at work, in public spaces, or even in-flight, has enhanced the convenience in our daily lives. Moreover, the expansion of Wifi networks and the use of new manufacturing technologies now allow the interconnection of devices, leading to the significant rise of the Internet of Things (IoT) and providing users with more comprehensive control over their digital environments. However, this proliferation of Wifi networks has also given rise to new threats that require careful evaluation and effective security strategies to ensure secure and risk-free Wifi connections for our data and information. Common Wifi security threats include data interception Man-in-the-Middle (MITM) attacks One of the fundamental challenges in Wifi security is preventing MITM attacks, where an intruder inserts themselves into the communication between two parties, compromising the integrity and confidentiality of sensitive data such as passwords and financial information. Spoofing of access points Hackers can create fake Wifi networks that mimic legitimate ones to attract unsuspecting users. Once connected to these malicious networks, our data can be captured by cybercriminals who may sell or misuse it for illicit purposes. Tips for achieving a secure Wifi connection: Strengthen authentication and use security protocols Prioritize strong encryption for networks to protect confidential information transmitted through it. WPA (Wifi Protected Access) encryption uses stronger algorithms than its predecessor, WEP (Wired Equivalent Privacy), making it more difficult for hackers to intercept and decipher data. Advanced security protocols like WPA3 provide individualized data encryption and advanced two-factor authentication (2FA) methods, adding an extra layer of security by requiring additional verification. Device management Properly manage and monitor devices connected to Wifi networks to minimize risks associated with the large number of connected devices in homes and businesses. Regularly update the router firmware and all connected devices to address potential vulnerabilities. Segmentation of the network to separate critical devices from less secure ones also helps mitigate the risk of threat propagation. Secure Router Configuration The router secure configuration is what will ensure the robustness and overall security of a wireless network. The router, being the first point of contact for devices connected to the Internet, acts as the first line of defence against potential attacks. For this reason, it is important to understand that the proper configuration of the router not only guarantees a stable and efficient connection but also establishes a protected environment that safeguards the integrity and privacy of our data. How to configure the router securely? To ensure a correct and secure configuration of the router, it is recommended to: Change the default username and password of the router, as these are easily accessible to attackers. Use strong passwords containing a combination of letters, numbers, and special characters. Disable remote administration to prevent cybercriminals from accessing the router externally. Enable WPA2 or WPA3 encryption instead of the outdated WEP for enhanced network security. Optionally, disable SSID broadcast to make the network less visible and harder to detect by hackers. Keep the router firmware updated to address vulnerabilities and improve overall device security. By following these steps, you will strengthen the security of your wireless network and reduce the chances of experiencing unwanted attacks or intrusions.

[ ... ]

The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
19/09/2022

Next for his market presentation, the main characteristics of the new generation of USB are already known: USB 4 2.0  promises to double the speed of Thunderbolt 4 and the original USB 4.Although we will have to wait until November to know all their technical characteristics, USB Promoter Groupt has already explained that USB 4 2.0 will offer speeds up to 80 Gbps for data transfer, through a USB-C cable and connector.This significant increase in transfer speed is possible because the new USBs incorporate a new physical layer architecture, capable of supporting. So, the new USB are preparing, for example, to support the transfer of 4K or 8K videos from one computer to another without problems or to offer, also, the maximum gaming experience to gamer users thanks to its ultra-fast speed rate.Intel, meanwhile, is already working on Thunderbolt 5, which everything indicates will also offer speeds of 80 Gbps.

[ ... ]

Metaverses for adults in Horizon Worlds from Meta
Metaverses for adults in Horizon Worlds from Meta
05/08/2022

Meta has announced that it will offer special spaces  in Horizon Worlds for user up of 18 years old. To do this, the company has already begun to contact users who are creating their digital worlds on this platform, who have been asked to classify their content. Otherwise, it will be Meta who does it and regardless of its character, it will classify it as restricted adult content.  All universes containing nudity, alcohol, soft drugs, blood, gambling promotion, etc. they will need to be rated 18+ through the Horizon Worlds settings section, "Build Mode" of the "World" tab.  Meta has also announced that regardless of rating, worlds that contain  explicit sexually content or promote violence or crime will be banned. Content depicting intense real-life violence or attempting to sell, buy, or trade regulated goods such as weapons, tobacco, or alcohol will be also prohibited.

[ ... ]

Menorca launches 5G connection in the 700MHz band while fiber optics continues  not reach in some areas of Ibiza
Menorca launches 5G connection in the 700MHz band while fiber optics continues not reach in some areas of Ibiza
13/05/2022

After the relevant procedures to verify the absence of interference with DTT or other incidents, Movistar has received the green light to turn on 5G in the 700MHz band in Menorca and at this time the municipalities of Es Mercadal and Sant Lluís are already under this coverage. The new 5G in the 700MHz band has better range and better capacity to go through obstacles, thus offering better indoor coverage and universalizing some of the characteristics of 5G communications, such as low latency. The switching on of 5G in the rest of the island will be gradual. And while this is happening in Menorca, in Ibiza, the mayor of Sant Josep, has transferred to Telefónica the need that the operator deploy its optic network to cover all the municipality, because, explains the mayor, there are still areas such as Es Cubells, Cala d'Hort or points in Sant Agustí where the fiber  network does not reach. The desire of the Ibiza Town Hall is, furthermore, to turn the capital of the island into one of the first destinations reached by 5G technological leap outside the large cities of the State. “It is a great opportunity for our citizens and the development of new economic sectors. We are also sure that 5G will soon be among the demands of tourists. The 5G availability will allow us to offer an exponential increase in added services to further improve their stay”, explained the Deputy Mayor for Finance and Modernization of Sant Josep, Vicent Roselló.

[ ... ]

Island Browser for Business Reaches $1.3 Billion Value
Island Browser for Business Reaches $1.3 Billion Value
06/04/2022

Just some weeks after its launch, Island, the webbrowser focused in enterprise and security, has just reached a $1.3 billion valuation.  Island browser is based on chromium and has been developed by two former Symantec executives, who were looking for an option configured to the web security needs of companies and not conventional users.  The new browser, in addition to limiting the add-ons that many often some people install on company computers and that sometimes cause significant security breaches, incorporates specific tools to prevent this type of actions, protect SaaS applications, identify incidents and prevent data theft.  Depending on the level of security required by each company, Island Browser allows, for example, to download content or not, disable or enable the copy and paste option or deny access to certain domains, among other options. From Island, also insist that their project is based on the utility and not on the consumer, so that the characterization level of Island browser it offers the minimum.

[ ... ]

Recycling containers connected to the mobile to reward the citizen
Recycling containers connected to the mobile to reward the citizen
31/03/2022

The Spanish startup Recircula Solutions has just presented Recysmart to the market, a device that can be installed in any type of urban container and identify the material of the recycled packages. The objective of this development is to promote incentive programs that helps population to recycle.  The device combines a unique mechanical design with AI algorithms based on acoustics, so  the unique and characteristic acoustic signal that a package generates when it's inserted into a container is captured by the sensor, processed and reported in real time to the managers authoritys so  they can remunerate the person who has use the container. To do this, the citizen will have previously identified himself on the device through his mobile or using a physical card.  In Sant Cugat del Vallés (Barcelona) several of these devices have  been installed in various containers in the town. Recircula Solutions will also send several units to Portugal, Austria, France, the United Kingdom and Greece.

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x