Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Firefighting drones Safer, but not immune
  • Big Data
    • A closer look at the GRAMMY Awards 2018 Big Data and the Blockchain phenomenon: Part II
  • Cybersecurity
    • Meet #LadyHacker Jess Woods, Cloud expert at Telefónica Tech Cyber Security Weekly Briefing, 3 – 9 December
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Artificial Intelligence

AI of Things

Could Big Data solve the music industry’s problems?

Musicians relations with their publishers and labels have always been tumultuous and it has been alleged with the amount of middle men in the industry that it can take...
AI of Things

4 companies using Big Data to address Water Scarcity

Water scarcity is an increasingly serious issue. It is estimated that by 2025, 1.8 billion people will face “absolute water scarcity”. The United Nations recognized the seriousness of this...
Ana Zamora

Hackathons are not just for developers

By Glyn Povah, Head of Global Product Development at LUCA. Hackathon is derived from the English words “hack” and “marathon”, and if you Google the word “hackathon” you’ll get something...
AI of Things

4 Data Enthusiasts changing the world as we know it

It is becoming increasingly apparent that NGOs and governments are creating more roles in the Data Science discipline. Using Big Data for social good is all about coming up with new...
AI of Things

When Big Data meets art

In this world of ours, it is normal to feel overwhelmed by the amount of information, facts and data we encounter everyday – and the quantity we are generating...
AI of Things

How we’re mapping Climate Change with Big Data

At the 2014 U.N. Climate Change Summit in New York City, U.S. President Barak Obama shared his thoughts on the seriousness of climate change. While acknowledging other pressing issues...
AI of Things

5 degree programs for becoming a Data Scientist

At LUCA, our Data Scientists are at the heart of what we do. Recruiting these valuable team members can be a challenge, though, because they are in such high...
AI of Things

Poverty Insights in Guatemala using Big Data

“No poverty” is the first of the U.N.’s 17 Sustainable Development Goals and it is closely linked with several other goals, including zero hunger, reduced inequality, and good health and...
AI of Things

4 times Big Data invaded the world of Fashion

The relationship between Big Data and Fashion stems back to 2013 when giants like ASOS and Gap started to use data to enhance their customer shopping experience – revolutionizing the way consumers buy garments online. 1. Chanel’s Data...
AI of Things

Axonix acquire mobile geolocation startup Statiq

This week, our programmatic trading platform, Axonix, has acquired British mobile geolocation data startup Statiq in our continued pursuit of data-driven business opportunities. The investment has been driven by...

Navegación de entradas

Previous articles
1 … 36 37 38 … 45
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration