Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Industry 4.0 is much more than Smart Factories The End of Internet as we know it
  • Big Data
    • An Artificial Intelligence capable of designing medicines from scratch The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II)
  • Cybersecurity
    • Metaverse (I): threats in an immersive, multi-sensory environment #CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI for all

AI of Things

The Deep Learning Hype

Written by Alfonso Ibañez, Data Science manager at LUCA consulting analytics In the era of Big Data a day does not pass without us reading some news about Artificial Intelligence, Machine...
AI of Things

5 in 5: How to successfully implement AI into your business (EP 2)

As many firms embark upon their digital transformation, confusion is growing around the use of Artificial Intelligence and what it will mean for the business world. As we have...
AI of Things

The Chief Data Officer: What can they do for your company?

Written by Antonio Pita Lozano, Operations & Solutions Director at LUCA Consulting Analytics. Head of Big Data Science Data economy, Big Data, Machine Learning, Artificial Intelligence or Internet of Things...
AI of Things

5 in 5: How AI can benefit your business (EP 1)

Over the last 10 years, we have experienced a monumental shift in the way in which businesses operate. Terms such as Big Data and Artificial Intelligence are common place, and as the full...
AI of Things

4 trends in technology for 2019

Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...
AI of Things

A Brief History of Machine Learning

As members of the Machine Learning community, it would be a good idea for us all to have an idea of the history of the sector we work in....
Santiago Morante Cendrero

Warning About Normalizing Data

For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
Richard Benjamins

Artificial Intelligence – Five Fears Explained

While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
AI of Things

Human Intelligence driving AI: Demand for Data Scientists

Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Paloma Recuero de los Santos

Artificial Intelligence: a “very human” technology

What makes us human? The answer to this question is not simple, it’s not easy to define what makes us human.We can try to find the answer from a...

Navegación de entradas

Previous articles
1 … 4 5 6 … 12
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration