Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 amazing things at CES 2018 IoT Solutions World Congress
  • Big Data
    • Weve launches Weve Locate – Location verification technology How to win over the Millennial Shopper? A great personalised experience will make them stay
  • Cybersecurity
    • 4 Tips for a Safe Return to the Workplace Fileless Malware: A Growing but Controllable Attack
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI for all

Richard Benjamins

How to fund your data journey

As of 2018, most large multinationals have started their journey to become a more data-driven organization, usually as part of their digital transformation. For most of them, it is...
AI of Things

Healthy Cities: a new paradigm to humanize smart technology

According to recent studies, urban dwellers are less able to regulate fear, anxiety or stress than residents in peripheral or rural areas. Issues such as rises in rent, perceived...
AI of Things

How the fashion industry is applying Big Data and AI

Season after season, retailers come up with loads of new products ready to hit shelves worldwide. While at one time, designers had no idea what their customers would like...
Richard Benjamins

How to select AI and Big Data use cases?

Many organizations that start working with Big Data and Artificial Intelligence (AI) ask themselves the question: where to start? In general, there are two ways to start: 1) start...
AI of Things

Big Data joins the fight against cancer

The medical community continues to make ground breaking discoveries every day, but with a survival rate of only 50% (Cancer Research UK), we still have a long way to...
Richard Benjamins

Four design principles for developing sustainable AI applications

Artificial Intelligence (AI) has been put forward as the technology that will change the world in the coming decades. Many applications already have seen the light including recommendations of...
Richard Benjamins

AI, Data and IT – how do they live together?

Many things related to AI and Data are about information technology (IT).  Systems, platforms, development, operations, security, all are needed for creating value with AI and Data, and are...
AI of Things

Data Roles: Which is the right one for you?

The world of Data, Machine Learning and Artificial Intelligence is so vast and varied, that it becomes necessary to define different profiles. Throughout this post we will describe each...
AI of Things

How Germany Moves project wins at the German Online Communications Awards

In another post from the start of this year, which you can read here, we presented the interactivty mobility map that our colleagues at Telefónica NEXT in Germany had created....
Richard Benjamins

Lessons learned from The Cambridge Analytica / Facebook scandal

It has been now some time that the Cambridge Analytica / Facebook scandal was first revealed on March 17, 2018 by The Guardian and the New York Times. Much has been...

Navegación de entradas

Previous articles
1 … 5 6 7 … 12
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration