Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart Mobility, distances connected IoT to save the environment
  • Big Data
    • Telefónica Tech AI of Things made real New developments in fitness and health data
  • Cybersecurity
    • Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity How to become a cyber resilient organisation

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

Carlos Lorenzo

You are no longer just a company of products or services, you are a data company

All companies in operation today are actually data companies. This is because, every day they collect and process a large amount of information: from customers, internal operations, suppliers, partners...
Jorge Rubio

Artificial Intelligence applied to industrial Cyber Security (OT)

Cyber Security in industrial or OT (Operational Technology) environments is crucial to protect critical infrastructures such as energy, transport and communication and has become an increasing concern as they...
Nacho Palou

Industrial digitalization: we share the keys at Advanced Factories

This week we are at Advanced Factories, the annual reference meeting on innovation and industrial automation, robotics, and digitalized industry or Industry 4.0. At Telfónica Tech, we are sharing our...
Estevenson Solano

Metaverse (II): the challenge of building a virtual space that is secure, inclusive and beneficial to everyone

As we learned in the previous article of this series, impact of the metaverse on disinformation, child security, its evolution and its potential to spread discrimination and inequalities will...
Nacho Palou

Edge AI: Artificial Intelligence outside Cloud

Edge AI refers to the execution of AI algorithms near or on devices such as wearables, mobiles, cameras, IoT (Internet of Things) sensors or edge servers, which the ability...
María Teresa Nieto Galán

Blockchain reinvents Digital Identity

The concept of Digital Identity has become increasingly important in our lives as the boundaries between real life and digital life blurred. As a result, and to the same...
Estevenson Solano

Metaverse (I): threats in an immersive, multi-sensory environment

While the discussion and excitement around the metaverse is growing, there are also feelings of doubt, fear, concern and uncertainty about the potential risks in an environment where the...
Nacho Palou

Satellites with 5G technology to provide IoT coverage worldwide

During the last edition of MWC, our colleague Javier Zorzano participated in the “5G IoT Summit: Hybrid NB-IoT and Satellite Solutions” alongside Shahbaz Ali, from Sateliot. In their talk,...
Jorge Ordovás

Rethinking consensus for a more sustainable Blockchain: from PoW to PoS

Keeping a record of information on public Blockchain networks (such as Bitcoin, Ethereum or others) involves solving the so-called “Byzantine Fault”: several contingents of the same army surround an...
The Event Horizon Telescope (EHT) collaboration, who produced the first ever image of a black hole released in 2019, has today a new view of the massive object at the centre of the Messier 87 (M87) galaxy: how it looks in polarised light. This is the first time astronomers have been able to measure polarisation, a signature of magnetic fields, this close to the edge of a black hole.  This image shows the polarised view of the black hole in M87. The lines mark the orientation of polarisation, which is related to the magnetic field around the shadow of the black hole. Photo: Imagen: EHT Collaboration
Javier Coronado Blazquez

Big Data in basic research: from elementary particles to black holes

Big Data paradigm has profoundly penetrated all the layers of our society, changing the way in which we interact with each other and technological projects are carried out. Basic...

Navegación de entradas

Previous articles
1 2 3 … 58
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration