Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What connected intelligence can do in your home Smart Parking, IoT valet parking for Smart Cities
  • Big Data
    • We apply quantum technology to real use cases of Blockchain and IoT The refugee crisis and Syrian Civil War; a humanitarian issue reflected through data
  • Cybersecurity
    • Fraud Orchestration is Helping Financial Institutions Fight Fraud in Real-Time Cyber Security Weekly Briefing, 5 – 11 November

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

AI of Things

Enhancing customer experiences with Smart Digits.

On November 21st 2017, we hosted a webinar about accelerating the digital transformation with LUCA’s Smart Digits product portfolio. Smart Digits is a B2B platform and set of secure...
Beatriz Sanz Baños

Fashion connected: the IoT revolution in the textile sector

Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños

Blockchain opportunities for IoT

Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María

5 amazing things at CES 2018

The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
AI of Things

How Germany moves

Our colleagues in Telefonica NEXT have created, using mobility data, data analysis and big data, an interactive map that lets you visualize nationwide traffic flows. Cities, transport companies and...
AI of Things

Dining with Data

Eating out at your favourite restaurant, discovering a hidden gem or even trying out a new recipe at home are some of the best ways to spend time. Some...
Mirian Martinez Varas

The 10 best blogposts of 2017

The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to  survey the best articles published during...
AI of Things

7 Big Data and AI predictions for 2018

2017 was, for the most part, an extremely successful year in terms of technological advancement. The IoT era kick started, Artificial Intelligence and Machine Learning gained public interest and...
AI of Things

Understanding clients of La Vaguada shopping center

Understanding the profile of clients, and their wants and needs, is vital for any brand. Companies that know what their target audience wants will be able to reach their...
AI of Things

5 Top Posts from LUCA Data Speaks Blog 2017

2017 has been a great year in many ways, in particular from a technological point of view. We have experienced an infinite number of advancements in the field and...

Navegación de entradas

Previous articles
1 … 36 37 38 … 58
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration