Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Success Story: achieving an audience based strategy When will Robots find a place in the Smart Home?
  • Big Data
    • Executive Insight Series by Glyn Povah, Director of Product Development at LUCA Whatsapp is down, now what?
  • Cybersecurity
    • A matter of trust: The need for governance and control of a project Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Beatriz Sanz Baños

IoT for Beginners (The Internet of latecomers)

Not everyone gets on the technological bandwagon at the same time. Early adopters happen to be the exception, not the rule. In fact, the most frequent scenario for many...
Beatriz Sanz Baños

FIWARE, the standard that IoT needs

What is FIWARE? FIWARE is an open source initiative that works towards building a set of standards to develop Smart applications for different domains such as Smart Cities, Smart Ports,...
Beatriz Sanz Baños

The Internet of the Best

Internet of Things Institute (www.ioti.com) started by Penton, is a research body that provides thought leadership through analysis, use cases and market trends, recently released its first selection of The...
Beatriz Sanz Baños

The era of a connected society

The twenty-first century will come to be known as the age of cities, but it will also become the century of data. Cities are the new engine of urban...
Beatriz Sanz Baños

How to know how smart a Smart City is

Forbes illustrates the clear cut contrast bigger cities face. On one hand, cities are responsible for generating 80% of the world’s wealth but compared to other geographical spaces they...
ElevenPaths

Cybersecurity Shot_MUPOL Information Leakage

Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Cascajo Sastre María

Using Smart Chatbots as an IoT interface

IoT devices are expected to reach 20.8 billion in number by 2020, and most of the data they produce is best accessed while users are mobile. There are a number...
Cascajo Sastre María

Internet of People. A primer on people tracking IoT technology

Billions of connected things. We hear it all the time. But what does this actually mean? What are those things? Are they only devices? No they are not. We can also...
Cascajo Sastre María

The Internet of Water

Internet of Things is growing at a faster pace than ever before. Its size is expected to quadruple over the next four years. The place where most of this...
Cascajo Sastre María

eSIM cards are here to boost the IoT

SIM cards are much more than what they appear to be. Within an apparently simple rectangular metal chip encased in a plastic carrier is a miniature computer! SIM stands...

Navegación de entradas

Previous articles
1 … 120 121 122 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration