Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The importance of labeling: spotlabel Programming languages in the IoT era
  • Big Data
    • Reinforcement learning…. the new player Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)
  • Cybersecurity
    • Expanding Neto capabilities: how to develop new analysis plugins ElevenPaths and BitSight deliver enhanced visibility into supply chain risk with continuous monitoring

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Photo: Parabol / Unsplash
Roberto González Rojo

Collaborative solutions to address the challenge of hybrid working

Microsoft surveyed 30,000 people in 31 different countries in 2021 as part of its Work Trend Index report, asking participants for their opinion on the most appropriate way to...
Photo: Hitesh Choudhary / Unsplash
AI of Things

Deep Learning: everything you need to know

Deep Learning is a concept that is becoming more and more relevant in digital strategies thanks to the possibilities it offers
Photo: Lenny Kuhne / Unsplash
Diego Samuel Espitia

Wireless attacks on OT

Wireless networks are now present in all types of industries. It is undoubtedly one of the most notable changes brought about by smart industry because it has increased productivity...
Photo: Mikayla Mallek / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 27 August — 2 September

Critical vulnerability in Atlassian Bitbucket Server and Data Center Atlassian has recently warned its users about a new critical vulnerability affecting the Bitbucket Server and Data Center software, which shall...
Photo: Nick Fewings / Unsplash
Alberto García García-Castro

TrustOS, the Swiss Army Knife of Blockchain Networks

Did you know that there are currently dozens of public Blockchain networks and that, added to the private and consortium ones, there could be hundreds? Which of them would...
Menacing robot
Santiago Morante Cendrero

AI in Science Fiction Films: A Recurring Pattern of Fascination and Horror

In today’s post we are going to explore how Hollywood films have dealt with the subject of technological advances, especially robotics and Artificial Intelligence. You will be surprised to...
Photo: Daniele Franchi / Unsplash
Miguel Maroto

How IoT solutions help us deal with rising energy prices?

Households, businesses and industry can improve energy efficiency, reduce costs and combat climate change thanks to IoT technology.
Image from No Man's Sky video game
Javier Coronado Blazquez

Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games

The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Photo: Persnickety Prints / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 8 — 19 August

Google reports largest DDoS attack in history Google researchers have reported the largest DDoS attack ever recorded. Last 1 June, a Google Cloud Armor client received a series of HTTP...
Fictional image generated by Dall-E 2, OpenAI's artificial inteligence.
Nacho Palou

The artificial intelligence Dall-E turns any idea expressed in a sentence into an image

Open AI shows some images generated by the Dall-E artificial intelligence when interpreting creative ideas expressed in natural language

Navegación de entradas

Previous articles
1 … 16 17 18 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration