Paloma Recuero de los Santos Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need? We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries. We will see what purpose some of them...
Richard Benjamins Towards a new Big Data ecosystem to mitigate Climate Change Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Beatriz Sanz Baños Bed time will never be the same Internet of Things has proven to be very useful in improving people’s lives in areas such as health and personal rest. This technology has also been proven to help...
Salmerón Uribes Marina “The client seeks to live a different experience with each purchase” “The music of nougat “El Almendro” is recognized by one hundred percent of the respondents” We all take it for granted when entering a hotel, a cafeteria or a supermarket...
Paloma Recuero de los Santos Python for all (2): What are Jupyter Notebooks? What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Carlos Alberto Lorenzo Sandoval Towards the Fourth Industrial Revolution The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...
Paloma Recuero de los Santos Python for all (1): Installation of the Anaconda environment Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
Beatriz Sanz Baños It’s one thing to be told you’re safe and it’s another thing to feel safe We can confirm that Smart Cities nowadays are already a reality and not a futuristic promise that is yet to come. Although there is still a long way to...
AI of Things The acceleration of the insurance sector in Big Data Of all the applications of Big Data, insurance companies demand to exploit the value of their data to enhance their relationship with their customer, from the acquisition to loyalty. In...
Beatriz Sanz Baños Movistar Car: transform your vehicle into a connected car The application of the Internet of Things in the devices of our environment has brought about an authentic revolution in our lives. Connectivity gives us an efficient digital life, both at work and...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Android malware not only posing as Word documents… but Excel as well China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...