Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Superpowers for everyone GSMA IoT Security Champion: Award to our IoT Security team
  • Big Data
    • Fighting Fraud: The $3.7 trillion black hole facing today’s organizations How can Big Data help to improve the financial scoring process?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 31 December – 6 January Differences between encryption, hashing, encoding and obfuscation

  • Artificial Intelligence
    • AI of Things

      Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

      Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
      AI of Things

      These free Google courses will get you started with generative-AI

      Learn about the concepts and principles of generative AI or how to create and deploy AI solutions: language models, image generation... and also about responsible AI.
    • Telefónica Tech
      Telefónica Tech

      Telefónica Tech, the new technologies blog

      They say that together we are stronger, and at Telefónica Tech we have realised about this. Good support is always a safe bet to strengthen the path, and if...
      AI of Things

      Data Transparency Lab looks for new projects on privacy and data transparency

      Data Transparency Lab (DTL) call for tools opens on August 10th and will end up on September 30th to attract new apps. The selected projects will get prizes ranging...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
  • Data stories
    • Coches antes y después del covid
      AI of Things

      Deep Learning and satellite images to estimate the impact of COVID19

      Motivated by the fact that the Coronavirus Disease (COVID-19) pandemic has caused worldwide turmoil in a short period of time since December 2019, we estimate the negative impact of...
      AI of Things

      Success Story: LUCA Transit and Highways England

      The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
    • AI of Things

      Planning retail site locations using data

      One of the key business decisions for any brand is deciding where to ‘set up shop’. This involves having an understanding of your consumer base and is particularly important...
      Figure 1: The Royal Palace is one of Madrid's top tourist attractions.
      AI of Things

      Case Study: LUCA Tourism and Royal Palace Visitors Analysis

      Madrid receives almost 6 million international tourists annually, who come to the city to see the history, soak up the sunshine and experience the culture. In addition to this...
    • Data stories
      • LUCA Case Studies
      • LUCA Proofs of concept

Área: LUCA

AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
Richard Benjamins

Lessons learned from The Cambridge Analytica / Facebook scandal

It has been now some time that the Cambridge Analytica / Facebook scandal was first revealed on March 17, 2018 by The Guardian and the New York Times. Much has been...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part II)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this article, the second about our experiment using Reinforcement Learning (RL) and Deep Learning in...
AI of Things

Business Messaging – From humble SMS to conversational commerce

Written by Jenny Whelan, Head of Business Affairs – LUCA Advertising We all know SMS. With 5 billion users, the reach of SMS as a messaging channel is unparalleled. Combined...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern AI can achieve the impressive performance in perception & recognition tasks mentioned in...
AI of Things

Big Data Analytics, but what type?

In today’s climate, businesses are already aware that if they don’t make the most of their data, they will be left behind by the competition. They know that traditional...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part I)

A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
Richard Benjamins

Will GDPR’s “right to data portability” change the data industry forever?

After years of preparation, on May 25 2018, the new General Data Protection Regulation (GDPR) has come into force.  Much has been written, discussed and speculated about it. Over...

Navegación de entradas

Previous articles
1 … 12 13 14 … 35
More articles
  • Telefónica Tech

Popular

Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration