Beatriz Sanz Baños Your children’s toys are now connected Smartwatches, drones, lights controlled from our mobile or connected scooters are already a reality in our everyday life. Connectivity and data storage have been gradually taking over the consumer...
Beatriz Sanz Baños The trip experience starts at the airport Madrid, December 6, 2019, 11:00 a.m. César starts his vacation today. He is very excited because it will be the first time he travels to Asia. He begins an exciting...
Beatriz Sanz Baños IoT arrives inside the volcanoes Thanks to the installation of sensors inside the crater, the information collected in real time about temperature, humidity and atmospheric pressure, can be accessed. In this way, you have...
Beatriz Sanz Baños IoT and everything under control With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Beatriz Sanz Baños Five keys of IoT in Industry 4.0 In the midst of the explosion of IoT, Gartner stated that there will be around 20.4 billion connected devices by 2020; automation and connectivity have become the hallmarks of what...
Beatriz Sanz Baños What connected intelligence can do in your home Lightbulbs that turn on and off remotely; washing machines that begin program 4 at 11:30; microwave ovens that heat up the food in the container five minutes before you...
Beatriz Sanz Baños An IoT that deserves an Oscar Connectivity has reached the film industry. The use of drones, virtual reality or beacon technology offers spectators the possibility of enjoying a much more complete audiovisual experience.
Beatriz Sanz Baños “Truly the Matrix, minus the human batteries” The Fourth Industrial Revolution is about much more than just applying today’s technology to industries. It’s about integrating intelligent cyber-physical systems such as AI and machine learning along with...
Beatriz Sanz Baños The emotions of IoT Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
Beatriz Sanz Baños Fashion connected: the IoT revolution in the textile sector Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños Blockchain opportunities for IoT Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María 5 amazing things at CES 2018 The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
Mirian Martinez Varas The 10 best blogposts of 2017 The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to survey the best articles published during...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick Who are you going to believe, me or your own eyes? The dilemma of managed security Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...