Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT and everything under control Movistar Car: transform your vehicle into a connected car
  • Big Data
    • Success Story: achieving an audience based strategy From Data Exhaust to Data-Driven: How CEOs face Big Data
  • Cybersecurity
    • Looking for a MDR partner? Beware, not all MDRs are the same Cyber Security Weekly Briefing 24-30 July
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI of Things

Beatriz Sanz Baños

The End of Internet as we know it

This post is part one of a two post series that will explore how communications are not only affected by the paradigm shift of connecting everything but a driving...
Beatriz Sanz Baños

Reviewing what makes a smart city smart

Smart Cities are no longer a promise of the future but an increasing priority for local, regional and countrywide governments and a flourishing business area for technological firms and...
Beatriz Sanz Baños

The impacts and benefits of telemetry in Industrial m2m processes

Industrial m2m solutions apply to different fields of industrial processes and can be used in different ways instead of having clear use cases like other more traditional m2m solutions. The...
Beatriz Sanz Baños

Kevin Ashton just asks companies to use the IoT

Acknowledged as the creator of the expression “Internet of Things” and precursor of a global standard system for Radio Frequency Identification (RFID), Kevin Ashton chatted with m2m Telefónica about the current...
María Cascajo Sastre

10 features that the city of the (near) future will have

The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños

What is the difference between M2M and IoT?

Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...

Navegación de entradas

Volver a portada
1 … 65 66
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration