Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Activation: the IoT Program for Startups The Hologram Concert – How AI is helping to keep music alive
  • Big Data
    • SMASSA Success Story: Intelligent Parking Services World Energy Saving Day: Efficiency to drive progress
  • Cybersecurity
    • Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations Cyber Security Weekly Briefing 28-31 december

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

Beatriz Sanz Baños

5 IoT elements to improve the customer experience in your store

There are fewer and fewer sectors that can ignore Internet of Things. What started as a tech trend focused on home security and personal exercise has evolved in such a...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
Richard Benjamins

Will GDPR’s “right to data portability” change the data industry forever?

After years of preparation, on May 25 2018, the new General Data Protection Regulation (GDPR) has come into force.  Much has been written, discussed and speculated about it. Over...
AI of Things

Podcast #1: The Challenges of working with data

This is the first of a series of podcasts where, Richard Benjamins, Data & AI Ambassador for Telefonica/LUCA, will share with us his thoughts and reflexions about these Technologies. Richard...
Luis Simón Gómez Semeleder

Farms 4.0: IoT to benefit agriculture

When we think about Internet of Things, different pictures come to mind: a sensor that measures the activity inside our house, a bracelet that helps us exercise, or a device that helps...
AI of Things

Ready for a Wild World: Big Data is key for humanitarian issues

The Big Data for Social Good event organized by LUCA, “Ready for a Wild World“, took place on May 24th and brought together experts from relevant global organizations and...
AI of Things

GDPR 101: What you need to know

On 25 May, the much talked about General Data Protection Regulation (GDPR), came into force. This new regulation has the primary objective of governing the gathering, using and sharing...
AI of Things

Our 5 Favorite Free Data Courses

Although it might seem like a nearly impossible feat, it is never too late to learn about Big Data, Machine Learning, and everything in between. You can get test...
AI of Things

Meet the Hyperconnected Museums of the Future

Today, Friday 18th May, museum all around the globe are taking part in the International Museum Day. This is an annual event organized by the International Council of Museums...
AI of Things

Download your eBook, The Data Economy: Wealth 4.0

Last month, the Telefonica Foundation, in collaboration with Afi (International Financial Analysts), Ariel and Editorial Planeta, published “The Data Economy: Wealth 4.0” which we at LUCA invite you to...

Navegación de entradas

Previous articles
1 … 31 32 33 … 58
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
ElevenPaths with triple representation at the eCrime 2015 conference
This year, the antiphishing working group organizes the eCrime 2015 conference in Barcelona from May 26 to 29. This symposium on eCrime investigation is attended by professionals who have...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration