Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • FIWARE, the standard that IoT needs Telefónica Activation Programme: Innovate with IoT
  • Big Data
    • Success Story: Using Big Data to improve Tourism with Iberostar What are the 5 principles of joined-up data?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 15-21 October Cybersecurity in films: myth vs. reality with 10 examples

  • Artificial Intelligence
    • AI of Things

      Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

      Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
      AI of Things

      These free Google courses will get you started with generative-AI

      Learn about the concepts and principles of generative AI or how to create and deploy AI solutions: language models, image generation... and also about responsible AI.
    • AI of Things

      Deep Learning vs Atari: train your AI to dominate classic videogames (Part I)

      A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
      Óscar Mancebo

      Movistar Living Apps, a new technological experience in the home

      The fact that Artificial Intelligence is revolutionising and transforming the telecommunications sector is nothing new. Users, accustomed to dealing with virtual assistants and chatbots, increasingly rely on digital transformation. Anticipating...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
  • Data stories
    • Coches antes y después del covid
      AI of Things

      Deep Learning and satellite images to estimate the impact of COVID19

      Motivated by the fact that the Coronavirus Disease (COVID-19) pandemic has caused worldwide turmoil in a short period of time since December 2019, we estimate the negative impact of...
      AI of Things

      Success Story: LUCA Transit and Highways England

      The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
    • AI of Things

      The data-driven “green corridor” in Cali

      The power of data has moved out of the confines of businesses and start-ups and has reached public circles and most notably, our cities. More and more local governments are hiring Big...
      AI of Things

      Success Story: pioneering project for economic and social development

      In a previous article we talked about how important it is to undertake a cultural transformation, that is, of individuals, whilst a company or sector undertakes a digital transformation...
    • Data stories
      • LUCA Case Studies
      • LUCA Proofs of concept

Área: LUCA

Richard Benjamins

Big Data Week 2016: Forget Big Data, Artificial Intelligence is the new kid on the block

Yesterday, the LUCA team attended the first day of Big Data Week. BDW is a global community that organizes an annual event focusing on the social, political, and technological...
Richard Benjamins

From Data Exhaust to Data-Driven: How CEOs face Big Data

Since Big Data became a buzzword in the board room of companies some years ago (thanks to McKinsey’s report “Big Data: The next frontier for innovation, competition, and productivity”), many...

Navegación de entradas

Volver a portada
1 … 34 35
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration