Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Fernando García Gómez Waste collection vehicles join the RevolutIOTn What’s the impact of technology in our lives? Undoubtely, it makes our daily life easier both in the personal and profesional field, allowing us to obtain more benefits with less...
Beatriz Sanz Baños IoT and everything under control With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Beatriz Sanz Baños IoT arrives inside the volcanoes Thanks to the installation of sensors inside the crater, the information collected in real time about temperature, humidity and atmospheric pressure, can be accessed. In this way, you have...
María Cascajo Sastre 10 features that the city of the (near) future will have The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...