Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart stores, the future of Retail IoT Trends for 2018, connectivity in the limelight
  • Big Data
    • We apply quantum technology to real use cases of Blockchain and IoT Big Dating: Could AI be the real matchmaker on Tinder?
  • Cybersecurity
    • ElevenPaths Presents DIARIO, the Malware Detector That Respects Users’ Privacy Cybersecurity Weekly Briefing September 5-11

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

AI of Things

AI of Things (XIII): Data visualisation for optimal fleet management

Witten by Víctor de AndrésAI & Analytics Full Stack Engineer at Telefónica Tech There is a current growing need for companies with fleets of vehicles to analyse the performance of...
Nacho Palou

LPWA and 5G networks enable new IoT solutions

LPWA and 5G networks enable the interconnection of millions of objects and IoT (Internet of Things) devices such as connected sensors to send captured or generated data to Cloud...
Nacho Palou

New business opportunities using Internet of Things (IoT)

Internet of Things devices and sensors enable the sensorisation of the environment, the fusion between the real world and the digital world. Thanks to IoT, smart devices generate a...
Santiago Morante Cendrero

Artificial Intelligence in Fiction: The Circle (2017), by James Ponsoldt

Plot The film The Cricle by James Ponsoldt, based on Dave Eggers‘ novel of the same title, introduces Mae Holland (Emma Watson) as a young intern who joins The Circle...
Marta Nieto Gómez-Elegido

“To be a hacker in life is to be a passionate, talented person who manages to influence the transformation of society”, Carmen Alonso

They say that passion for a profession is forged at an early age. Our parents are our first and most important role models. So, it is not surprising that...
Carlos Martínez Miguel

Three principles for building a reliable Artificial Intelligence

Artificial Intelligence allows machines to learn, both supervised and autonomously. The proliferation of Cloud technologies, the digitalisation of images, texts and audios and the development of IoT (Internet of...
Daniel García

AI of Things (XII): OEM solutions for the connected car

We recently decided to renew our car at home by switching to a new one that is safer and more efficient. After the purchase process came the long awaited...
Photo: Arthur Mazi / Unsplash
María Teresa Nieto Galán

Digital Identity, Privacy and Blockchain —Can They All Be In The Same Equation?

We are becoming increasingly aware of how our data is circulating on the net. In fact, we have all probably had that feeling that, after looking at a pair...
Ismael Rihawi

Artificial Intelligence, IoT, and Blockchain: surfing the “Third Wave”

Back in 1980, futurologist Alvin Toffler published The Third Wave, a book inspired by Steve Case to express his vision of the development of the information technology paradigm in...
Photo: Leti Kugler Y / Unsplash
María Teresa Nieto Galán

What was traced first in Blockchain, the chicken or the egg?

Globalisation has become part of our daily lives in all economic activity areas. Some of those areas where change has been most visible are the agricultural, poultry and livestock...

Navegación de entradas

Previous articles
1 … 4 5 6 … 58
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration