Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart stores, the future of Retail IoT Trends for 2018, connectivity in the limelight
  • Big Data
    • We apply quantum technology to real use cases of Blockchain and IoT Big Dating: Could AI be the real matchmaker on Tinder?
  • Cybersecurity
    • ElevenPaths Presents DIARIO, the Malware Detector That Respects Users’ Privacy Cybersecurity Weekly Briefing September 5-11

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

Nacho Palou

We are now live! Discover the new Telefónica Tech website

We have redesigned the Telefónica Tech website to represent who we are as a digital solutions integrator. We also want to share what we do, who is behind it...
Nacho Palou

Key ingredients for today’s Smart Cities

The term Smart City used to refer to “cities of the future”, but Smart Cities are increasingly turning the present. Thanks to the use of digital solutions such as...
Nacho Palou

Smart urban lighting: business opportunities and benefits

Smart street lighting is one of the pillars of smart cities. In fact, it is one of the best examples of what the term Smart City means: the application...
Nacho Palou

A concept popularized by a former Google CEO is more relevant today than ever

A few years ago, Google’s then CEO Eric Schmidt popularised the concept of “augmented humanity”. This term refers to the ability of technology to “enhance human capabilities” to make...
Nacho Palou

How to start programming in Artificial Intelligence: languages, tools and recommendations

There is a very close relationship between Big Data and Artificial Intelligence (AI): Big Data is about capturing, processing and analysing large amounts of data. When this data is...
Photo: Vardan Papikyan / Unsplash
Alberto García García-Castro

Incentives in business blockchain networks: a new approach

It has always been a fundamental part of the technology to use incentives that reward collaboration and good practices among participants in a blockchain network. So much so that...
Nacho Palou

Blockchain for increasing security in the buying and selling of vehicles

Digital technologies such as connectivity, Internet of Things or Artificial Intelligence are becoming increasingly common in vehicles. For example, in the form of digital assistants, mobility services, or advanced...
Santiago Morante Cendrero

Artificial Intelligence in Fiction: The Bestiary Chronicles, by Steve Coulson

It is common in the era of Artificial Intelligence (AI) to hear about how this technology can revolutionise different areas of human life, from medicine to manufacturing. However, in...
Nacho Palou

AI of Things: 9 essential posts to say goodbye to 2022

AI of Things (Artificial Intelligence of Things) is the set of technologies that bring together IoT devices —physical objects with sensors, software and connectivity— with Big Data and Artificial...
Nacho Palou

Ethical IoT: principles for an implementation that respects people’s rights

IoT (Internet of Things) is one of the fundamental technologies in more and more digital transformation processes and for the development of new business opportunities. It consists of the...

Navegación de entradas

Previous articles
1 … 3 4 5 … 58
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration