Wednesday 29 January 2020


In the technological age in which we live It is said that social networks have made all communications more horizontal,  a tweet can have as much impact as an article in a diary or even more. Without realizing it, we are transforming ourselves into a society of smiling and citizen emojis of the good roll, making our life dependent on a status on social networks social networks creating an invitation to enter into a technological gloom that is affected both in bioengineering, as to the means of communication, good and evil, science and religion.

The production of Black Mirror labeled as a series, It is rather a unitary execution, with a thematic plot without plot, No fixed characters, focused on digital technologies, their possibilities and fears. It seems that Invita the new to the old debate between the defenders and detractors of the technological revolution.

The thin subjectivity of the individual to the devices, and how the individual nature moves to the experience of a bond, basically emotional and collective. As the article indicates, in "Smile, they are getting you scored," the panoptic structure of the network underscores our condition as subjects that circulate through the story as objects; we are in a reality built and paved with our profile, in which our body becomes a prosthesis full of devices, in which the senses are reduced or replaced by sensors that process thousands of stimuli. In which experiments are already carried out to increase the human immune system with an inorganic system, bionic; An army of nanorobots and sensors monitor what happens inside our body.

Enrique Dans, professor at IE Business School, assures that privacy is a concept in constant evolution, where technology "has been supplementing our mental bandwidth to a point where we can, simply looking for a name in a search engine and in some social networks, get lots of data from anyone”. For him, we should be concerned that this technological capacity to obtain data is used by governments to control their citizens, what happens in China: an undemocratic government obsessed with controlling and managing the speed of change in its society, it might even be understandable but not justifiable.

What should seriously concern us is that some supposedly democratic governments they seem to secretly envy the control that China has and imitate the technology you use with justifications like security, the fight against the terrorist threat, the protection of children, the defense of copyright, or any other.

Lev Manovich says that the software is in charge. We need it to understand and exercise on the web, to explore information, to turn the cloud into something useful. Black Mirror is a disturbing door that questions our human nature from the spasms of technology; it is a good excuse to rationalize what is happening in a superficial and egomaniac society.

Follow me and I follow you!!

In addition to all this and although it does not look like it, we are continuously scoring. In social networks, we do it with updates and interactions. It is true that we do not give a note from one to five, but we do say if we like something. Moreover, in the episode of Black Mirror, the protagonists laughs at the jokes of others, hoping for reciprocity, and bite a cookie just to make a perfect picture. 

Have you ever written a tweet just to get fans? Have you ordered the table a bit because this way the breakfast will be better in the photo and will have more "like"? Have you ever followed someone with the hope that they will return the following? Do not? Me neither.

"Our conventional response to all media, especially the idea that what counts is how you use them, it is the dormant posture of the technological idiot ", remember McLuhan.

Wednesday 15 January 2020


The Mobile World Congress (MWC) lands again in Barcelona next February and the commercial courts already prepare all their artillery to avoid collapse and be able to quickly and efficiently address the lawsuits on intellectual and industrial property.

The leading fair in the mobile telephony and Internet sector becomes the showcase of the most innovative and cutting-edge technology and, at the same time, a focus of potential violations of Industrial Property rights for companies participating in this event, being able to cause them irreparable and economically significant damages.

A few months ago the Law on Business Secrets came into force in Spain (Law 1/2019, of February 20, on Business Secrets), aimed especially at companies and entrepreneurs who wish to obtain greater security in relation to the confidentiality and protection of inventions Non-patented algorithms, customer or supplier listings, commercial strategies or marketing campaigns, since historically this was an unprotected asset, with the enactment of this law a legal and procedural framework is established so that companies can defend in court what belongs to them.

This year the courts of Barcelona, ​​which have always been the pioneers in Spain in establishing procedural guidelines for action, have created a protocol for the Protection of Business Secrecy in the Courts, trying to adopt a series of homogeneous procedural practices according to what it establishes the standard, to safeguard technical and commercial information, strategies among others; The confidentiality of the companies. The Protocols that will be applicable this year throughout the month of February 2020, this will be the first time that a protocol will be applied for the possible violation of Business Secrets, since it will be the first MWC in which it will enter into force.

  • CREATION OF PROTOCOLS: The protocol provides for the possibility of requesting the restriction of a limited number of people from access to documents and media as well as to the views and their recordings, to prepare non-confidential versions of documents and judicial resolutions and to instruct experts to prepare summaries of the information. in addition, in addition to the transfer of copies not being made directly between administrators.
  • CONFIDENTIALITY: After the judicial resolution that agrees to this measure of protection will have to identify in detail, with name, surname, function, and relationship with the parties, the members that will compose a circle of confidentiality, from this creation to be able to access all the information It will be a very difficult or almost impossible task. In these circles may be, in addition to the judges and court personnel, the parties and their representatives, advisors, attorneys, lawyers, internal and external experts, experts, employees, and so on; establishing two levels of access to the circle: one with more sensitive information, and the second one, with less sensitive confidential information, and all those involved will have to sign a confidentiality commitment.


1. Greater legal certainty: this law reinforces the security and protection of undisclosed knowledge and information, as long as appropriate measures are carried out.
2. Integral protection: The protection is established against their uses or disclosures made by people who have been given access to information and also to industrial espionage.
3. Legal actions against offenders: the law establishes judicial actions or compensation that can be requested from the offender, taking into account the damage caused, the lost profits and the enrichment of the offender, in addition to the moral damage caused.
4. Restricted circle, proceedings and precautionary measures: among the procedural developments, the restriction of persons with access to evidence or court hearings, the regulation of the procedures that the holder may request and the precautionary measures whose adoption may be required may be highlighted.
5. Investment and growth: greater protection of business secrets favors the investment associated with the generation of knowledge, so this law favors companies and research organizations.

“The law has had an unquestionable impact, but it is important that companies are prepared and adopt protection protocols for their assets that can be framed in what the law defines as business secrets,”  S├ínchez, J.
Powered by Blogger.