Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The impacts and benefits of telemetry in Industrial m2m processes The Technological Revolution in The Medical Sector
  • Big Data
    • Data Science – Helping consumers to save money and travel for less TOP 5: The 5 most read posts of Synergic Partners
  • Cybersecurity
    • Telefónica and ElevenPaths integrate its digital signature solution and biometric SealSign with Microsoft Azure GSMA IoT Security Champion: Award to our IoT Security team

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

AI of Things

Machine Learning identifying rare genetic disorders

Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces?  The quantity of genetic illnesses is so...
Beatriz Sanz Baños

A much safer world is possible thanks to IoT

The police forces usually use reactive methods to stop the damage generated when a crime occurs. However, security measures are being transformed into more preventive actions by allowing them to predict...
AI of Things

Artificial Intelligence converts thoughts into speech

Neuroscientists at Columbia University have discovered a ground-breaking way of turning thoughts into speech, that could potentially give individuals who have lost their ability to speak a voice. Professor Mesgarani...
Beatriz Sanz Baños

The “Cable Girls” of today

Technological revolutions, such as the growth of Internet of Things, generate disruptive social changes. One of the most important consequences is the great boost they generate for the development of...
Paloma Recuero de los Santos

Python for all (4): Data loading, explorative analysis and visualisation

Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
AI of Things

Artificial Intelligence Fighting Fraud and False Declines

Through the use of Decision Intelligence and Artificial Intelligence Express platforms, Mastercard have harnessed the power of predictive analytics and machine learning to reduce the rate of false decline...
Beatriz Sanz Baños

Medical video assistance thanks to IoT

Much has been said about the arrival of Internet of Things in numerous sectors such as industry, home automation or even leisure, but little, however, of its application to...
Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Beatriz Sanz Baños

Bed time will never be the same

Internet of Things has proven to be very useful in improving people’s lives in areas such as health and personal rest. This technology has also been proven to help...

Navegación de entradas

Previous articles
1 … 20 21 22 … 58
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration