Strategy, leadership, and technology: the voices behind Urudata, now all in one place.
In a world with an extremely high rate of digital transformation, companies face a dual challenge: to innovate in order to remain competitive, and to do so responsibly toward the planet. Sustainability has moved beyond being a “nice-to-have” in IT. In 2025, sustainable Information Technology (IT) management—also known as Green ITSM—is no longer […]
We launched Urudata R&D in April 2024 with a simple idea: to conduct Applied Research and, through it, generate new business lines for the organization. But what is Applied Research? Or at least, how do we conceive it at Urudata? Fail fast, fail often, and create meaningful impact with just a few successes. Because if we don’t fail often enough,...
In any operational area—technology, production, logistics, or services—there is one recurring truth: what isn’t measured gets interpreted. And when everything is left to interpretation, quality, efficiency, and customer experience end up depending on opinions rather than facts. That’s why KPIs...
We tend to think that AI is neutral, but sometimes it makes unfair, discriminatory, or simply incorrect decisions. Why? Because it learns from us—human beings who feed systems with information shaped by our own conscious (or unconscious) biases—creating a “mirror effect” between our minds and algorithms, replicating our...
In times of immediacy, where information is just a click away and a delivery can solve dinner in less than 30 minutes, anything that requires more time and dedication seems obsolete. We have become practical and efficient, incorporating tools that allow us to take shortcuts...
Documentation is a very important element within organizations. It serves to establish guidelines, plan activities, record events, transfer information, and more. In today’s environment, more and more documentation is being created—whether due to internal needs, regulatory requirements, or contractual obligations. Organizations maintain policies, procedures, records, plans, matrices, forms,...
In the first article of this series, I left the door open to tell the story of agile methodologies. When we hear “Agile,” we think of boards covered with Post-its, daily stand-ups, and continuous releases—of teams closely associated with information technology (IT). However, its DNA was forged much earlier,...
In a world that is changing faster than ever, the skills that were once considered sufficient to succeed at work are no longer enough. Artificial intelligence, automation, and the increasing complexity of teams have transformed the way we work, making it increasingly...
When I graduated as a chemical and food engineer, I never imagined that years later I would be leading the operations department at a tech company like Urudata. My career started in the industry, working on production lines, quality systems, process controls, and logistical challenges. Today, my daily work revolves around IT solutions,
Information security has been a highly relevant topic in our country for some time now. This is due to the growing number of widely reported data breaches and successful attacks affecting various companies, organizations, and government institutions. A simple search on Google is enough to...
The hidden cost of not managing knowledge only becomes apparent when the people who hold that knowledge are no longer around. More subtly, it shows up without warning through suboptimal processes—caused by dependence on specific individuals or the lack of proper documentation that would allow quick access to the information needed to take action or make decisions.
To understand how we came to be immersed in a world that constantly talks about artificial intelligence, It’s helpful to analyze and reflect on the fact that this is not entirely new, but rather something that the scientific community has been working for many years to theorize and attempt to build machines that resemble us or at least simulate our human capabilities.
At work, at home, at university — and everywhere! We have a world of tools at our disposal to stay connected, something that neither our parents nor grandparents could have ever imagined. Every day, we face a flood of emails, chats, meetings, newsletters, WhatsApp messages, video calls, and countless other methods that supposedly came to make our lives easier and keep us better connected.
This article summarizes what was presented at the Urudata & Google event held on May 15, 2025. It was automatically generated by our youngest assistant: NeuraBot, powered by Tu Neural.
Although we create a secure environment when analyzing our clients' data — both from a technological standpoint (data encrypted at rest and in transit, hardened devices, perimeter security, and DLP tools, among others) and a legal one (NDAs with the company and involved technicians) — there are additional science- and technology-based measures that provide extra layers of security, and those are the ones we propose to review in this article.
What Types of Cybercriminals Are There? For a few weeks now, Netflix has been streaming a series called Zero Day, which depicts a massive cyberattack on a country (in this case, the victim is the United States) and how such a conflict is addressed—a highly relevant and probable scenario (needless to say, there are already recorded cases).
I Have Too Much Data! The biggest challenge organizations face when incorporating AI technology is the disorganization of information and the sometimes uncontrollable volume of data.
Today, service desks are a central point for organizations to provide necessary IT support to their users. They have evolved from being a secondary need to becoming an integral part of business processes. Service desks have grown by helping users maximize the use of technology, thus enabling productivity increases through effective tech usage.
You found a job opportunity that you love, researched the company, and felt it was exactly what you were waiting for. You applied enthusiastically, got a call, passed the first interview (Yes!), and suddenly… they schedule a psychotechnical evaluation. That’s when the nerves kick in, the annoyance, the juggling to coordinate a time for the evaluation, and the all-too-common questions: “Why so many evaluations if I have years of experience?” “What a waste of time!” “And with a little drawing, they’re going to determine if I’m fit for the job?”
A few weeks ago, the ACM announced the 2024 Turing Award (the Nobel equivalent in the field of computer science) for Andrew Barto and Richard Sutton, for their contributions to the field of reinforcement learning (RL).
In 2024, we faced the challenge of assisting the data team of the Montevideo Municipality (IM) in generating an origin-destination matrix for the city using travel data from buses and phone movements between antennas.
These days, a Netflix series titled Zero Day is being widely streamed in our country. It presents several technical cybersecurity concepts that are unfamiliar to the public in general, that´s why we have received inquiries from both clients and friends in regard.
Many times, doubts arise about which approach is best for a particular project. Sometimes, it is even the client who pushes for a certain method due to trends or habits, without sufficient arguments or situational analysis. This is where the guidance of project managers becomes essential.