Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Madrid is IoT LPWA and 5G networks enable new IoT solutions
  • Big Data
    • Chema Alonso stars in “Big Data, Living with Algorithms” We’re talking about technology, will you join the conversation?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 3 — 9 September We Acquire iHackLabs to Boost the Training of Our Ethical Hackers

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

AI of Things

MWC 2017 Day 1: Unlocking Big Data value with LUCA Comms

This week, we’re showing a range of truly exciting demos on our stand at Mobile World Congress in Barcelona. In Hall 3, as part of Telefónica’s stand – we’re...
AI of Things

Open Data and API’s in Video Games: League of Legends puts them to practice

  When we at LUCA became aware of the release of the upcoming Movistar eSports we wanted to give a nod to fans of games like LOL and CSGO. With the help of David Heras, who collaborated...
Ana Zamora

LUCA reshapes tourism insights at SDWC 2017

Last Friday, the first edition of the World Conference on Smart Destinations took place in Murcia. More than 100 experts from over twenty countries discussed trends such as digital...
AI of Things

Our top 5 Big Data blogs

Want to keep up with the latest innovation Big Data? Who are the Artificial Intelligence gurus out there on Twitter? It’s normal to feel the struggle to keep up...
AI of Things

4 reasons why you should visit the LUCA stand at MWC2017

Next week, we’ll be taking part in Mobile World Congress in Barcelona, the world’s largest gathering for the telecommunications industry. With Big Data and Artificial Intelligence playing such a...
Ana Zamora

Open Algorithms, what are they? Yves-Alexandre de Montjoye explains

Yves – Alexandre de Montjoye is a lecturer at Imperial College London’s new Data Science Institute. As a postdoctoral researcher at Harvard IQSS, his main field of research focuses on metadata...
Ana Zamora

LUCA Talk 2: Big Data as a Force for Good

In the world of data, we tend to focus on how Big Data technology can optimize our organizations, maximize revenues and make our organizational processes more efficient. However, there is...
Beatriz Sanz Baños

GeoGestión, the Internet of Mobile Workforces

GeoGestión is a solution that streamlines processes that were previously costly for businesses in terms of both money and resources. To illustrate this with some examples this system addresses...
Richard Benjamins

How these 4 sports are using Data Science

Thousands of companies around the world may have started their journey to become data-driven, harnessing the full potential of Big Data, however, the world of professional sports is only...
AI of Things

These 4 people are using Big Data to find their Valentine

More often than not, we talk about the application of Big Data in the realms of business – focusing on how such technology can enable us to optimize our...

Navegación de entradas

Previous articles
1 … 48 49 50 … 58
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Cybercrime is already a global scourge…Do you really think you are protected?
Nowadays, the exponential development experienced within the ICT field has led to a new scenario where the organizations are capable of exchanging information more effectively, stablishing new business models,...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
ElevenPaths with triple representation at the eCrime 2015 conference
This year, the antiphishing working group organizes the eCrime 2015 conference in Barcelona from May 26 to 29. This symposium on eCrime investigation is attended by professionals who have...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration