{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/extrimian.io\/category\/software-dev\/#CollectionPage","headline":"Software &amp; Dev Category","description":"<p>Geared towards developers and IT professionals, this category provides in-depth tutorials, coding tips, and best practices for integrating and leveraging Extrimian\u2019s technology in software development and IT projects.<\/p>\n","url":"https:\/\/extrimian.io\/category\/software-dev\/","hasPart":[{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/why-extrimian-is-an-ai-first-company\/","headline":"Why Extrimian is an AI-First Company","url":"https:\/\/extrimian.io\/why-extrimian-is-an-ai-first-company\/","datePublished":"2025-09-16","dateModified":"2025-09-16","mainEntityOfPage":"https:\/\/extrimian.io\/why-extrimian-is-an-ai-first-company\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/09\/Why-Extrimians-AI\u2011First-Approach-Improves-Digital-Credential-Solutions.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/09\/Why-Extrimians-AI\u2011First-Approach-Improves-Digital-Credential-Solutions.png","height":1063,"width":2125},"keywords":["AI","AI driven","AI powered","AI-first","Bockchain","ciberseguridad","credenciales verificables","datos universitarios","IA","Identificaci\u00f3n","inteligencia artificial","Learn | Academy","Micelya","Micelya AI","Noticias","Podcast","seguridad de datos","tecnolog\u00eda educativa","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/the-future-of-university-credentials-secure-transparent-and-user-friendly\/","headline":"The Future of University Credentials: Secure, Transparent, and User-Friendly","url":"https:\/\/extrimian.io\/the-future-of-university-credentials-secure-transparent-and-user-friendly\/","datePublished":"2025-08-14","dateModified":"2025-08-19","mainEntityOfPage":"https:\/\/extrimian.io\/the-future-of-university-credentials-secure-transparent-and-user-friendly\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/08\/How-can-a-university-stop-fake-diplomas-and-identity-theft-_cover-scaled.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/08\/How-can-a-university-stop-fake-diplomas-and-identity-theft-_cover-scaled.png","height":1280,"width":2560},"keywords":["AI","artificial intelligence","EdTech","Learn | Academy","News","Product Announcements","Product Updates","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/uagro-digital-wallet-for-diploma-verification\/","headline":"UAGro digital Wallet for Diploma Verification","url":"https:\/\/extrimian.io\/uagro-digital-wallet-for-diploma-verification\/","datePublished":"2025-05-22","dateModified":"2025-05-22","mainEntityOfPage":"https:\/\/extrimian.io\/uagro-digital-wallet-for-diploma-verification\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/05\/UAGro-Wallet-Transforming-Diploma-and-Data-Verification-and-cybersecurity-Extrimian-scaled.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/05\/UAGro-Wallet-Transforming-Diploma-and-Data-Verification-and-cybersecurity-Extrimian-scaled.png","height":1280,"width":2560},"keywords":["AI","artificial intelligence","EdTech","Learn | Academy","News","Product Announcements","Product Updates","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/university-e-learning-data-security\/","headline":"University &amp; E-Learning Data Security","url":"https:\/\/extrimian.io\/university-e-learning-data-security\/","datePublished":"2025-05-08","dateModified":"2025-05-16","mainEntityOfPage":"https:\/\/extrimian.io\/university-e-learning-data-security\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/05\/University-Data-Security-with-Decentralized-Identity-scaled.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/05\/University-Data-Security-with-Decentralized-Identity-scaled.png","height":1280,"width":2560},"keywords":["AI","EdTech","Learn | Academy","Product Updates","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/verifiable-credentials-issuing\/","headline":"Verifiable Credentials, DIDs, and Cybersecurity","url":"https:\/\/extrimian.io\/verifiable-credentials-issuing\/","datePublished":"2025-04-08","dateModified":"2025-04-08","mainEntityOfPage":"https:\/\/extrimian.io\/verifiable-credentials-issuing\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/VC_Verifiable-Credential-Wiki.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/02\/VC_Verifiable-Credential-Wiki.png","height":1563,"width":3125},"keywords":["AI","artificial intelligence","EdTech","Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/ai-for-data-security-and-verification\/","headline":"AI for Data Security and Verification","url":"https:\/\/extrimian.io\/ai-for-data-security-and-verification\/","datePublished":"2025-03-10","dateModified":"2025-03-10","mainEntityOfPage":"https:\/\/extrimian.io\/ai-for-data-security-and-verification\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/03\/AI-for-Data-Security-and-Verification-Verifiable-Credentials-W3C-standard-AI-SSI-Solutions.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2025\/03\/AI-for-Data-Security-and-Verification-Verifiable-Credentials-W3C-standard-AI-SSI-Solutions.png","height":1438,"width":2875},"keywords":["artificial intelligence","Learn | Academy","Podcast","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/health-data-security-with-decentralized-identity\/","headline":"Health Data Security with Decentralized Identity","url":"https:\/\/extrimian.io\/health-data-security-with-decentralized-identity\/","datePublished":"2024-12-18","dateModified":"2024-12-18","mainEntityOfPage":"https:\/\/extrimian.io\/health-data-security-with-decentralized-identity\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/12\/Health-Data-Security-with-Decentralized-Identity.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/12\/Health-Data-Security-with-Decentralized-Identity.png","height":1563,"width":3125},"keywords":["EdTech","Learn | Academy","Product Announcements","Product Updates","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/verifiable-credentials-with-attachments-docs\/","headline":"Verifiable Credentials with attachments docs","url":"https:\/\/extrimian.io\/verifiable-credentials-with-attachments-docs\/","datePublished":"2024-12-11","dateModified":"2025-02-17","mainEntityOfPage":"https:\/\/extrimian.io\/verifiable-credentials-with-attachments-docs\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/12\/Verifiable-Credentials-with-attachments-documents_cover-blog-image.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/12\/Verifiable-Credentials-with-attachments-documents_cover-blog-image.png","height":1563,"width":3125},"keywords":["Learn | Academy","News","Product Announcements","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/decentralized-identity-in-education\/","headline":"Decentralized Identity in Education","url":"https:\/\/extrimian.io\/decentralized-identity-in-education\/","datePublished":"2024-11-29","dateModified":"2024-11-29","mainEntityOfPage":"https:\/\/extrimian.io\/decentralized-identity-in-education\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/11\/Decentralized-Identity-in-Education_SSI_Blockchain_Web3_Cybersecurity.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/11\/Decentralized-Identity-in-Education_SSI_Blockchain_Web3_Cybersecurity.png","height":1563,"width":3125},"keywords":["EdTech","Learn | Academy","Web3 Education"]},{"@type":"BlogPosting","@id":"https:\/\/extrimian.io\/age-verification-in-online-gaming-betting\/","headline":"Age Verification in Online Gaming &amp; Betting","url":"https:\/\/extrimian.io\/age-verification-in-online-gaming-betting\/","datePublished":"2024-07-26","dateModified":"2024-07-26","mainEntityOfPage":"https:\/\/extrimian.io\/age-verification-in-online-gaming-betting\/","author":{"@type":"Person","@id":"https:\/\/extrimian.io\/author\/julieta-cura\/#Person","name":"Julieta Cura","url":"https:\/\/extrimian.io\/author\/julieta-cura\/","identifier":2,"description":"Enthusiast of decentralized technologies and specialist in Growth Marketing and Content Marketing at Extrimian.","image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","url":"https:\/\/extrimian.io\/wp-content\/litespeed\/avatar\/ed18e4cfaf7da338dfbbe661bf3e56a6.jpg?ver=1777468581","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Extrimian","logo":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/05\/Extrimian_Logos_Share_Logo-Extrimian-One-Line-color.png","width":2387,"height":584}},"image":{"@type":"ImageObject","@id":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/07\/Age-Verification-in-Online-Gaming-Betting-with-Self-Sovereign-Identity.png","url":"https:\/\/extrimian.io\/wp-content\/uploads\/2024\/07\/Age-Verification-in-Online-Gaming-Betting-with-Self-Sovereign-Identity.png","height":1438,"width":2875},"keywords":["EdTech","Learn | Academy","News","Web3 Education"]}]}