Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence of Things, how things plan to make our lives simpler Most read content in 2021
  • Big Data
    • Trump: one year in data How Germany Moves project wins at the German Online Communications Awards
  • Cybersecurity
    • Cybersecurity Weekly Briefing 23-29 May Triki: Cookie Collection and Analysis Tool
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Artificial Intelligence

AI of Things

A Brief History of Machine Learning

As members of the Machine Learning community, it would be a good idea for us all to have an idea of the history of the sector we work in....
Santiago Morante Cendrero

Warning About Normalizing Data

For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
AI of Things

Big Data & AI changing the music game: IBM Watson BEAT

Music is something that unites us. Go anywhere in the world and you will find music: someone singing, playing, rapping or dancing. For thousands of years it has formed...
AI of Things

Expert Systems in the World of Medicine

Written  by Sergio Sancho Azcoitia, Security Research en ElevenPaths  Since its appearance a few years ago, expert systems have been applied in different fields. Due to their effectiveness they have...
Richard Benjamins

Artificial Intelligence – Five Fears Explained

While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
AI of Things

AI Powering the IVF Revolution

Get ready, an IVF revolution is on the way. Scientists have discovered that an Artificial Intelligence machine, when shown images of hundreds of embryos, can predict which will result in live birth...
AI of Things

Human Intelligence driving AI: Demand for Data Scientists

Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Paloma Recuero de los Santos

Artificial Intelligence: a “very human” technology

What makes us human? The answer to this question is not simple, it’s not easy to define what makes us human.We can try to find the answer from a...
Richard Benjamins

How to fund your data journey

As of 2018, most large multinationals have started their journey to become a more data-driven organization, usually as part of their digital transformation. For most of them, it is...
AI of Things

Successful digital campaigns with Smart Insights

Post written by Carlos Vayas, Business Manager Big Data & Advertising The key to executing a successful digital campaign is having the appropriate data at the time of decision making...

Navegación de entradas

Previous articles
1 … 20 21 22 … 45
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration