Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Madrid is IoT Women’s Engineering Day: Building New Paths
  • Big Data
    • 54% of organizations now have Chief Data Officers, but should mine? Mum, when I grow up I want to be a hacker
  • Cybersecurity
    • Where is your company on the cybersecurity journey? New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI of Things

AI of Things

Chiemsee-Alpenland Tourism and Telefónica Next Examine visitors to the Chiemsee lake

Original post by Cécile Schneider, Telefónica NEXT The touristic region of Chiemsee-Alpenland and our colleagues at Telefónica NEXT used data analysis to examine the profile of visitors to the Chiemsee...
Anshul Kudal

How to win over the Millennial Shopper? A great personalised experience will make them stay

Data is essential in creating a personalised experience which attract Millennial clients. The obtaining and exchanging of information, always maintaining the privacy of the client, which is key in...
AI of Things

AI will enable doctors to spend more time with their patients

The technical revolution within the NHS suggested in this report could not have come at a better time. We have doctors and GPs overburdened with more and more patients...
New born gazelle
Rubén Granados

Reinforcement learning…. the new player

Here, we would like to present a ´new´ guest, reinforcement learning (RL). Not as new, because it has been with us since the 80s. We will quickly go over the classic approximations, that...
Beatriz Sanz Baños

Park your car with IoT

Parking your car has turned into a difficult task in many cities. Looking for a space is a constant source of stress for citizens. Luckily, Internet of Things was born to...
Beatriz Sanz Baños

IoT is increasingly getting safer

Technology is constantly evolving and offering new applications to users. There are always risks when innovating and putting these inventions into practice is more likely when the risks are...
Diego Martín Moreno

What are Blockchain and Smart Contracts?

Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
AI of Things

Blockchain and IoT predictions for 2019

Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
Beatriz Sanz Baños

Take control of your vehicles with Fleet Optimise

Mobility has become more intelligent thanks to the presence of IoT. In the same way that users use the connected solutions to make more efficient journeys or to park...
ElevenPaths

GSMA IoT Security Champion: Award to our IoT Security team

We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...

Navegación de entradas

Previous articles
1 … 27 28 29 … 66
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Cybersecurity Shot_LinkedIn information leakage
Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration