Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence 2022: myths and realities Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone
  • Big Data
    • Python for all (4): Data loading, explorative analysis and visualisation How to select AI and Big Data use cases?
  • Cybersecurity
    • Cybersecurity Weekly Briefing October 10-16 #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

AI of Things

MWC 2017 Day 1: Unlocking Big Data value with LUCA Comms

This week, we’re showing a range of truly exciting demos on our stand at Mobile World Congress in Barcelona. In Hall 3, as part of Telefónica’s stand – we’re...
AI of Things

Open Data and API’s in Video Games: League of Legends puts them to practice

  When we at LUCA became aware of the release of the upcoming Movistar eSports we wanted to give a nod to fans of games like LOL and CSGO. With the help of David Heras, who collaborated...
Ana Zamora

LUCA reshapes tourism insights at SDWC 2017

Last Friday, the first edition of the World Conference on Smart Destinations took place in Murcia. More than 100 experts from over twenty countries discussed trends such as digital...
AI of Things

Our top 5 Big Data blogs

Want to keep up with the latest innovation Big Data? Who are the Artificial Intelligence gurus out there on Twitter? It’s normal to feel the struggle to keep up...
AI of Things

4 reasons why you should visit the LUCA stand at MWC2017

Next week, we’ll be taking part in Mobile World Congress in Barcelona, the world’s largest gathering for the telecommunications industry. With Big Data and Artificial Intelligence playing such a...
Ana Zamora

Open Algorithms, what are they? Yves-Alexandre de Montjoye explains

Yves – Alexandre de Montjoye is a lecturer at Imperial College London’s new Data Science Institute. As a postdoctoral researcher at Harvard IQSS, his main field of research focuses on metadata...
Ana Zamora

LUCA Talk 2: Big Data as a Force for Good

In the world of data, we tend to focus on how Big Data technology can optimize our organizations, maximize revenues and make our organizational processes more efficient. However, there is...
Beatriz Sanz Baños

GeoGestión, the Internet of Mobile Workforces

GeoGestión is a solution that streamlines processes that were previously costly for businesses in terms of both money and resources. To illustrate this with some examples this system addresses...
Richard Benjamins

How these 4 sports are using Data Science

Thousands of companies around the world may have started their journey to become data-driven, harnessing the full potential of Big Data, however, the world of professional sports is only...
AI of Things

These 4 people are using Big Data to find their Valentine

More often than not, we talk about the application of Big Data in the realms of business – focusing on how such technology can enable us to optimize our...

Navegación de entradas

Previous articles
1 … 48 49 50 … 58
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration