Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Connected Health, or IoT as your best lifeline LPWA and 5G networks enable new IoT solutions
  • Big Data
    • Are you Ready for a Wild World? Don’t miss out on Big Data for Social Good 2018! A new organizational role for Artificial Intelligence: the Responsible AI Champion
  • Cybersecurity
    • Where is your company on the cybersecurity journey? New tool: Neto, our Firefox, Chrome and Opera extensions analysis suite
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI of Things

Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Beatriz Sanz Baños

Bed time will never be the same

Internet of Things has proven to be very useful in improving people’s lives in areas such as health and personal rest. This technology has also been proven to help...
Salmerón Uribes Marina

“The client seeks to live a different experience with each purchase”

“The music of nougat “El Almendro” is recognized by one hundred percent of the respondents” We all take it for granted when entering a hotel, a cafeteria or a supermarket...
Paloma Recuero de los Santos

Python for all (2): What are Jupyter Notebooks?

What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Carlos Alberto Lorenzo Sandoval

Towards the Fourth Industrial Revolution

The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...
Paloma Recuero de los Santos

Python for all (1): Installation of the Anaconda environment

Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
Beatriz Sanz Baños

It’s one thing to be told you’re safe and it’s another thing to feel safe

We can confirm that Smart Cities nowadays are already a reality and not a futuristic promise that is yet to come. Although there is still a long way to...
AI of Things

The acceleration of the insurance sector in Big Data

Of all the applications of Big Data, insurance companies demand to exploit the value of their data to enhance their relationship with their customer, from the acquisition to loyalty. In...
Beatriz Sanz Baños

Movistar Car: transform your vehicle into a connected car

The application of the Internet of Things in the devices of our environment has brought about an authentic revolution in our lives. Connectivity gives us an efficient digital life, both at work and...

Navegación de entradas

Previous articles
1 … 29 30 31 … 66
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration