Open Innovation Campus

Innovation for Talent Program

Discovery #OpenTechTalks

Experiment with the projects developed by our innovation team. Revolutionize and test technologies, discover trends in disruptive projects, tools and proofs of concept, applying innovative ideas.

In #OpenTechTalks we offer you a wide range of content, where you can experiment with technology and trends, discover disruptive projects and tools where we apply innovative ideas.

Discover

Discover

News and trends in Artificial Intelligence, Cybersecurity, Web3 and much more, from experts and recognized professionals in innovation.

Experience

Experience

The topics and contents we explore will allow you to try out innovative tools and projects, where you can apply disruptive ideas.

Learn

Learn

In each chapter we share with you our experience, the knowledge we have gained and the proofs of concept we have developed.

New edition

Interacting with Intelligence: Langchain at the Intersection of Language and AI
New

Interacting with Intelligence: Langchain at the Intersection of Language and AI

We are witnessing a great revolution. The communication barriers between humans and machines are fading away, offering a world of possibilities. In this CodeTalks by Ideas Locas, Fran Ramirez and Hector Cordobés tell you about the subfield of AI, called "Natural Language Processing".

Other contents of this edition

Exploring vulnerabilities in Smart Contracts: A Learning Opportunity
Exploring vulnerabilities in Smart Contracts: A Learning Opportunity
Creating AI Programs with pipelines, step by step
Creating AI Programs with pipelines, step by step
CrazyToolBox: a toolkit for Web3 and Blockchain
SPECIAL EPISODE - CrazyToolBox: a toolkit for Web3 and Blockchain
Clone Voices: The rise of fake audio and how to detect it
Clone Voices: The rise of fake audio and how to detect it
Tkinter a PySide: Explorando Interfaces Gráficas en Python
Tkinter a PySide: Explorando Interfaces Gráficas en Python
LevelUp: Play and discover vulnerabilities
LevelUp: Play and discover vulnerabilities
WEB3 | Evolution
WEB3 | Evolution
CodeTalks4Devs by Ideas Locas
Deep Fake Detector, detecting deepfakes in real time
What is happening with Copilot security?
What is happening with Copilot security?
Using AI so you can compose music like Bach
Using AI so you can compose music like Bach
on-the-fly: Your swiss army knife for networks
on-the-fly: Your swiss army knife for networks
Mom, I want to be a DataScientist
Mom, I want to be a DataScientist: Where do I start?

Past editions

All
Season 1
Season 2
Season 3
Season 4
Season 5
The interpretability of AI models and the XIA
The interpretability of AI models and the XIA
How can I get started in the Artificial Intelligence world?
How can I get started in the Artificial Intelligence world?
The world of APIs to generate cybersecurity tools
The world of APIs to generate cybersecurity tools
Applying AI to the sounds that roar the loudest
Applying AI to the sounds that roar the loudest
Honey Badger
Honey Badger
ATTPwn_ Adversary emulation
ATTPwn_ Adversary emulation
Analyzing Source Code Security
Analyzing Source Code Security Using Heat Maps
Create your BLE security test environment
Create your BLE security test environment with Micro:Bit and MakeCode
SIEMs Attack Framework
SIEMs Attack Framework, when the vulnerable point in the network is not the one you expected...
Integrating DIARIO
Integrating DIARIO into your document analysis routine
Rubika
Rubika: a Rubik's Cube based Anti-Rubber Hose System
Fear the FOCA
Fear the FOCA: more efficient, more functional and more fearsome
Introducing Stack SMS in the IoT World
Introducing Stack SMS in the IoT World
your router on Paranoid Mode
Wild Wild Wifi: your router on Paranoid Mode
Integrating Latch in Docker
SuperLatch: Integrating Latch in Docker and Kubernetes
controlling your home from Latch
Latch IoT: controlling your home from Latch
How to train your artificial intelligence
How to train your artificial intelligence with the OpenAi Gym framework
iBombShell: pentesting
iBombShell: pentesting on the go
Latch Voice
Latch Voice: Playing with voice assistants and Latch
WordPress in Paranoid Mode
WordPress in Paranoid Mode
Evil Foca from the inside, meet her!
Evil Foca from the inside, meet her!
LiLaS, a project to protect data networks
LiLaS, a project to protect data networks
UAC-A-MOLA
UAC-A-MOLA enables investigation, detection and mitigation of uac bypasses
Hidden Networks
The 'Hidden Networks' created by USBs
Latch integration in Java
Latch integration in Java
Latch Integration in .NET
Latch Integration in .NET
Distribute your Latch secret without risk
Limited Secrets: Distribute your Latch secret without risk
Detection of anomalies in network traffic
Detection of anomalies in network traffic using machine learning
MicroLatch
MicroLatch: Building Latch in the palm of your hand
Latch Cloud TOTP in NodeJS y .NET
Latch Cloud TOTP in NodeJS y .NET
DirtyTooth
DirtyTooth: Installing on your Raspberry with a DEB package
Data Exfiltration
Implementation of Data Exfiltration with Latch’sApp
SDK from Go for Latch
SDK from Go for Latch
webhooks de Latch
Say goodbye to "polling" in Latch with the new Webhooks

You have seen of videos

Load More