Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The intelligence of IoT Fashion connected: the IoT revolution in the textile sector
  • Big Data
    • Can Mobile Data combat Climate Change in Germany? What are Blockchain and Smart Contracts?
  • Cybersecurity
    • Cyber Security Weekly Briefing 23-29 October The Framing Effect: you make your choices depending on how information is presented

  • Artificial Intelligence
    • AI of Things

      Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

      Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
      AI of Things

      These free Google courses will get you started with generative-AI

      Learn about the concepts and principles of generative AI or how to create and deploy AI solutions: language models, image generation... and also about responsible AI.
    • AI of Things

      Rebuilding Mocoa with Big Data

      The possibilities of Big Data to contribute to social good are infinite and has proven itself as an indispensable tool to achieve the Sustainable Development Goals by 2030. The natural...
      AI of Things

      LUCA at #HackForGood

      Are you passionate about using technology to have a social impact? Do you believe in using hacking and data science techniques to change the world? Then put #HackForGood at the...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
  • Data stories
    • Coches antes y después del covid
      AI of Things

      Deep Learning and satellite images to estimate the impact of COVID19

      Motivated by the fact that the Coronavirus Disease (COVID-19) pandemic has caused worldwide turmoil in a short period of time since December 2019, we estimate the negative impact of...
      AI of Things

      Success Story: LUCA Transit and Highways England

      The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
    • AI of Things

      Planning retail site locations using data

      One of the key business decisions for any brand is deciding where to ‘set up shop’. This involves having an understanding of your consumer base and is particularly important...
      AI of Things

      Aim for 2017: Change the World

      Have you already made your New Year’s resolutions? How would you feel if one of those was to change the world? Three nights ago millions of people had 12 grapes...
    • Data stories
      • LUCA Case Studies
      • LUCA Proofs of concept

Área: LUCA

Richard Benjamins

Big Data Week 2016: Forget Big Data, Artificial Intelligence is the new kid on the block

Yesterday, the LUCA team attended the first day of Big Data Week. BDW is a global community that organizes an annual event focusing on the social, political, and technological...
Richard Benjamins

From Data Exhaust to Data-Driven: How CEOs face Big Data

Since Big Data became a buzzword in the board room of companies some years ago (thanks to McKinsey’s report “Big Data: The next frontier for innovation, competition, and productivity”), many...

Navegación de entradas

Volver a portada
1 … 34 35
  • Telefónica Tech

Popular

Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration