Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What’s the role of satellite connectivity in an IoT world? The era of a connected society
  • Big Data
    • Big Dating: Could AI be the real matchmaker on Tinder? Big Data and Elections: We shine a light on Trump and Clinton
  • Cybersecurity
    • New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains The risks of not having controlled exposure to information (II)

  • Artificial Intelligence
  • IoT
  • Blockchain

Área: AI of Things

Nacho Palou

5G connectivity: Four real and practical use cases

According to data from GSMA, collected by the publication Redes & Telecom, by the end of 2022, over one billion 5G connections had been surpassed worldwide; this figure will...
Nacho Palou

5 free online courses to learn IoT (Internet of Things) in 2023

Internet of Things (IoT) is one of the new generation digital technologies with significant impact in multiple sectors, from industry to agriculture, health, and energy. IoT creates new business...
AI of Things

Women who changed Mathematics

BY FRAN RAMÍREZ & FRAN FENOLL Since March is also International Mathematics Day, we wanted to pay tribute to the great influence that women have had on this science from the beginnings...
Nacho Palou

Meet #LadyHacker Jess Woods, Cloud expert at Telefónica Tech

Today, March 8th, International Women’s Day, we start a series of interviews with #LadyHackers from Telefónica Tech. Through their work and effort, these women are helping us become a...
Sergio Piorno

A new financial paradigm: asset tokenization

The digitalisation of the financial ecosystem has accelerated in recent years thanks to the widespread adoption of the internet and its consequent development. This, together with the rise of...
Nacho Palou

MWC: All the innovations and expertise we shared

Following four intense days, Mobile Word Congress (MWC) 2023 bids farewell today until next year. Since opening its doors last Monday, attendees have had the opportunity to see the...
Nacho Palou

The 9th century mathematician who laid the foundations of Artificial Intelligence

Algorithm is a very trendy word, as it relates closely to automation, data-driven decision making, and Artificial Intelligence in the digital realm. Algorithms are used in many machine learning systems...
Jorge Ordovás

Decentralised social networks: Could this be the first Web3 service to reach the mass public?

If we had to highlight one of the most relevant proposals in the field of Web3 during the last months of 2022, we would probably have to talk about...
Javier Coronado Blazquez

Ghosts in the machine: does Artificial Intelligence suffer from hallucinations?

Artificial Intelligence (AI) content generation tools such as ChatGPT or Midjourney have recently been making a lot of headlines. At first glance, it might even appear that machines “think”...
Miryam Artigas

Using Midjourney to create social media content

Any sentence containing the word ‘dinosaur’ is worthy of attention. Admit it, it happens to you too. And if not, I’ll tell you why we’re talking about dinosaurs in a...

Navegación de entradas

Previous articles
1 2 3 4 … 58
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration