Wednesday, 4 March 2020


The profession of private investigator is one of the pioneers in the incorporation of women into the sector. Kate Warne has the honor of being the first female detective in the United States, with just 25 years she became a great asset for the success of Allen Pinkerton and therefore for the National Pinkerton Detective Agency being the right hand of the detective and in the supervisor of the women's research department that Pinkerton.

In 1856, a woman named Kate Warne entered the offices of the Pinkerton Detective Agency and asked to see Allen Pinkerton applying for a job as a secretary but this position had already been filled but she told Allan Pinkerton that she wanted to work as a private investigator, arguing that as a woman, she could infiltrate environments where men could not enter, and make friends with the wives of suspects to get information; Pinkerton put her to the test for a short period and was impressed by her achievements; She was subsequently hired as one of her best and most valuable detectives.

Kate Warne was part of the Pinkerton team that discovered a plot to assassinate President Abraham Lincoln, however, the details of these events were developed in part by Kate Warne, who worked undercover as a rich southern lady; Warne infiltrated social gatherings and verified that there was a plot to assassinate Lincoln.

Lincoln was placed in the protective custody of Allen Pinkerton to safely take him to Washington DC. and Kate Warne was a key player in undercover plans to move Lincoln to Washington DC., Kate Warne came up with the idea that Lincoln was disguised as her invalid brother. Kate Warne, the first female private investigator in the United States, can receive credit for saving the life of a man who was about to become president of the United States.

After the American Civil War, between 1865 and 1867 Kate continued to solve complicated cases such as the murder of George Gordon, a bank teller or the case of Captain Sumner, who thought, and rightly, that he was being poisoned throughout twelve years was one of the most valuable researchers, being the first detective woman in the history of the US and therefore the first woman in the world.

Her brilliant career was truncated by a terrible pulmonary edema because of a pneumonia that would take her until her death on January 28, 1868 with only 35 years of age. She was buried in the Graceland Cemetery in Chicago, on the family plot of Allan Pinkerton.

It must be remembered that when he hired Kate Warne as a private detective, there were no police, no detectives or women were entitled to vote. However, Pinkerton instantly saw the value of his service and his ability to obtain information that a man could never obtain.

Wednesday, 12 February 2020


Valentine is the day of all lovers, and some people celebrate it twice.

One of the most anticipated dates for all lovers on the planet, is on February 14 the “Valentine's Day”, and although for some it is only one more date on the calendar, there are many people who consider it as the most Romantic of the year, being the perfect opportunity to celebrate and surprise your loved one.

Christoph Kraemer, European spokesman for Ashley Madison the most important marriage dating website in the world, comments: “Valentine's Day is a beautiful date to show love or affection for your partner, everyone likes to receive some detail and feeling special, the interesting thing is that there is much more willingness to celebrate a special day with a lover. ”

Infidelity today became such a common practice that there is a world day to celebrate it, so on February 13 the “Mistress Day” or “Lovers Day” is proclaimed a celebration from the United States and that according to A study carried out every year is celebrated more among its unfaithful users.

If you feel that the relationship with your partner is declining, that your partner began to be more distant and your sixth sense tells you that something is wrong, these are some of the behaviors that could unveil your partner's infidelity according to the specialist:

1. Changes in your routine
Almost all couples, especially those who have been together for many years have a specific schedule of their day to day, but if this suddenly changes from one day to another, you have to be alert because the change in behavior is one of the first signs of infidelity.

2. Extra expenses without explanation
This is one of the mistakes that infidels make most, start spending on the family account or occupy credit cards, without thinking that the couple can be aware of these movements just by calling the bank or reviewing the application of this from the cellphone.

3. Overtime at work
Especially when it had never happened before, there is always the possibility of actually telling the truth, but you are also entitled to question and question.

4. New look
Being in a "new relationship" the infidels try to get in shape, change their look, buy new clothes, that is, they care more about their physical appearance than before.

5. The electronic secret
A new password on your mobile or to be smarter now has two cell phones, your partner does not access your social media accounts or emails when you are with him, filter and do not keep your call history.

6. Lies and irritability
Like any person who tries to hide something, when he feels questioned or about to be caught he evades the situation by putting himself in a bad mood. In addition, an infidel must lie again and again to maintain his double life.

Do you have doubts about the loyalty of your partner?

If there are doubts about the fidelity of your partner and you are afraid to confront the situation for fear of making a mistake, it is best to investigate thoroughly until you have complete certainty of what is happening and for this there are specialists who are in charge of unmasking the infidels and Oliver Detectives We help you to confirm or deny suspicions, doubts and the possibility of being deceived, in order to establish instability in your social and couple relationships.

Wednesday, 29 January 2020


In the technological age in which we live It is said that social networks have made all communications more horizontal,  a tweet can have as much impact as an article in a diary or even more. Without realizing it, we are transforming ourselves into a society of smiling and citizen emojis of the good roll, making our life dependent on a status on social networks social networks creating an invitation to enter into a technological gloom that is affected both in bioengineering, as to the means of communication, good and evil, science and religion.

The production of Black Mirror labeled as a series, It is rather a unitary execution, with a thematic plot without plot, No fixed characters, focused on digital technologies, their possibilities and fears. It seems that Invita the new to the old debate between the defenders and detractors of the technological revolution.

The thin subjectivity of the individual to the devices, and how the individual nature moves to the experience of a bond, basically emotional and collective. As the article indicates, in "Smile, they are getting you scored," the panoptic structure of the network underscores our condition as subjects that circulate through the story as objects; we are in a reality built and paved with our profile, in which our body becomes a prosthesis full of devices, in which the senses are reduced or replaced by sensors that process thousands of stimuli. In which experiments are already carried out to increase the human immune system with an inorganic system, bionic; An army of nanorobots and sensors monitor what happens inside our body.

Enrique Dans, professor at IE Business School, assures that privacy is a concept in constant evolution, where technology "has been supplementing our mental bandwidth to a point where we can, simply looking for a name in a search engine and in some social networks, get lots of data from anyone”. For him, we should be concerned that this technological capacity to obtain data is used by governments to control their citizens, what happens in China: an undemocratic government obsessed with controlling and managing the speed of change in its society, it might even be understandable but not justifiable.

What should seriously concern us is that some supposedly democratic governments they seem to secretly envy the control that China has and imitate the technology you use with justifications like security, the fight against the terrorist threat, the protection of children, the defense of copyright, or any other.

Lev Manovich says that the software is in charge. We need it to understand and exercise on the web, to explore information, to turn the cloud into something useful. Black Mirror is a disturbing door that questions our human nature from the spasms of technology; it is a good excuse to rationalize what is happening in a superficial and egomaniac society.

Follow me and I follow you!!

In addition to all this and although it does not look like it, we are continuously scoring. In social networks, we do it with updates and interactions. It is true that we do not give a note from one to five, but we do say if we like something. Moreover, in the episode of Black Mirror, the protagonists laughs at the jokes of others, hoping for reciprocity, and bite a cookie just to make a perfect picture. 

Have you ever written a tweet just to get fans? Have you ordered the table a bit because this way the breakfast will be better in the photo and will have more "like"? Have you ever followed someone with the hope that they will return the following? Do not? Me neither.

"Our conventional response to all media, especially the idea that what counts is how you use them, it is the dormant posture of the technological idiot ", remember McLuhan.

Wednesday, 15 January 2020


The Mobile World Congress (MWC) lands again in Barcelona next February and the commercial courts already prepare all their artillery to avoid collapse and be able to quickly and efficiently address the lawsuits on intellectual and industrial property.

The leading fair in the mobile telephony and Internet sector becomes the showcase of the most innovative and cutting-edge technology and, at the same time, a focus of potential violations of Industrial Property rights for companies participating in this event, being able to cause them irreparable and economically significant damages.

A few months ago the Law on Business Secrets came into force in Spain (Law 1/2019, of February 20, on Business Secrets), aimed especially at companies and entrepreneurs who wish to obtain greater security in relation to the confidentiality and protection of inventions Non-patented algorithms, customer or supplier listings, commercial strategies or marketing campaigns, since historically this was an unprotected asset, with the enactment of this law a legal and procedural framework is established so that companies can defend in court what belongs to them.

This year the courts of Barcelona, ​​which have always been the pioneers in Spain in establishing procedural guidelines for action, have created a protocol for the Protection of Business Secrecy in the Courts, trying to adopt a series of homogeneous procedural practices according to what it establishes the standard, to safeguard technical and commercial information, strategies among others; The confidentiality of the companies. The Protocols that will be applicable this year throughout the month of February 2020, this will be the first time that a protocol will be applied for the possible violation of Business Secrets, since it will be the first MWC in which it will enter into force.

  • CREATION OF PROTOCOLS: The protocol provides for the possibility of requesting the restriction of a limited number of people from access to documents and media as well as to the views and their recordings, to prepare non-confidential versions of documents and judicial resolutions and to instruct experts to prepare summaries of the information. in addition, in addition to the transfer of copies not being made directly between administrators.
  • CONFIDENTIALITY: After the judicial resolution that agrees to this measure of protection will have to identify in detail, with name, surname, function, and relationship with the parties, the members that will compose a circle of confidentiality, from this creation to be able to access all the information It will be a very difficult or almost impossible task. In these circles may be, in addition to the judges and court personnel, the parties and their representatives, advisors, attorneys, lawyers, internal and external experts, experts, employees, and so on; establishing two levels of access to the circle: one with more sensitive information, and the second one, with less sensitive confidential information, and all those involved will have to sign a confidentiality commitment.


1. Greater legal certainty: this law reinforces the security and protection of undisclosed knowledge and information, as long as appropriate measures are carried out.
2. Integral protection: The protection is established against their uses or disclosures made by people who have been given access to information and also to industrial espionage.
3. Legal actions against offenders: the law establishes judicial actions or compensation that can be requested from the offender, taking into account the damage caused, the lost profits and the enrichment of the offender, in addition to the moral damage caused.
4. Restricted circle, proceedings and precautionary measures: among the procedural developments, the restriction of persons with access to evidence or court hearings, the regulation of the procedures that the holder may request and the precautionary measures whose adoption may be required may be highlighted.
5. Investment and growth: greater protection of business secrets favors the investment associated with the generation of knowledge, so this law favors companies and research organizations.

“The law has had an unquestionable impact, but it is important that companies are prepared and adopt protection protocols for their assets that can be framed in what the law defines as business secrets,”  S├ínchez, J.
Powered by Blogger.