Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Make your holidays run smoothly with IoT IoT and Big Data: the parents of carsharing
  • Big Data
    • How the fashion industry is applying Big Data and AI A history of Lisp and its use in neural networks – Part I
  • Cybersecurity
    • Cyber Security Weekly Briefing 30 January – 5 February Cyber Security Weekly Briefing May 29- June 4
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI of Things

Óscar Mancebo

Movistar Home, the reinvention of the home thanks to Artificial Intelligence

At the 2018 edition of MWC, we announced that we were working on Movistar Home, a device aimed at reinventing the home incorporating Aura, Telefónica’s artificial intelligence, for its...
Beatriz Sanz Baños

The Champions is also IoT

IoT technology makes the Wanda Metropolitano football stadium one of the most advanced in the world, thanks to its great connectivity capacity and the audiovisual experience and unique lighting...
Alfonso Ibañez

Semi-Supervised Learning… the great unknown

In recent years much progress has been made in solving complex problems thanks to Artificial Intelligence algorithms. These algorithms need a large volume of information to discover and learn, continuously, hidden patterns in the...
Cristina de la Cruz

Do Virtual Assistants improve the user experience with telcos?

Virtual Assistants are more and more relevant in people’s daily lives, especially when it comes to requesting traffic information, reminders, weather reports… However, when it comes to interacting with...
Fernando Menéndez-Ros

“Artificial Intelligence is amazing, but it must act with principles and values.”

This week, Telefónica has played a very important role as a Global Partner Leader in the Digital Enterprise Show (DES 2019), Europe’s largest professional forum dedicated to the digital...
AI of Things

Responsible AI by Design in Practice

How organizations can minimize the risk of undesirable, unintended consequences of AI using a methodological approach The use of Artificial Intelligence is increasing rapidly and can be applied in many...
Fernando Menéndez-Ros

“Data, Cloud and AI are the fuel for digital transformation.”

The TM Forum 2019 has recently taken place in Nice (France), a forum that encourages the industry’s association and drives the digital transformation of companies, that was attended by...
Beatriz Sanz Baños

5G – The Key Technology for the development of IoT

The development of 5G technology represents a disruptive advance in the telecommunications sector. It is a new type of wireless connectivity that provides a higher speed of data transfer...
AI of Things

The future of OpenAI and the alternatives to its end as a non-profit business

Just a few days ago, the well-known research company within the Artificial Intelligence environment, OpenAI, has announced the end of its non-profit operations. Since starting, OpenAI have championed the development and promotion...
Mirian Martinez Varas

MWC 2018: How Telefónica will create a better future with IoT

On February 26, the MWC 2018 will be launched, a new tech gathering where the most important and innovative firms in the technology industry will meet. And naturally, Telefónica will be there presenting...

Navegación de entradas

Previous articles
1 … 25 26 27 … 66
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Cybersecurity Shot_LinkedIn information leakage
Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration