Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes) What is Smart Retail?
  • Big Data
    • What to expect from Artificial Intelligence in 2020? Deep Learning: everything you need to know
  • Cybersecurity
    • Cyber Security Weekly Briefing 13-19 November Curiosities About Windows XP Code Leak

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Why you are late delivering all your projects and what you can do to address it
ElevenPaths

Why you are late delivering all your projects and what you can do to address it

Anyone who causes harm by forecasting should be treated as either a fool or a liar. Some forecasters cause more damage to society than criminals. —Nassim Taleb, The Black Swan, 2007 In 1957,...
AI of Things

The future of OpenAI and the alternatives to its end as a non-profit business

Just a few days ago, the well-known research company within the Artificial Intelligence environment, OpenAI, has announced the end of its non-profit operations. Since starting, OpenAI have championed the development and promotion...
Mirian Martinez Varas

MWC 2018: How Telefónica will create a better future with IoT

On February 26, the MWC 2018 will be launched, a new tech gathering where the most important and innovative firms in the technology industry will meet. And naturally, Telefónica will be there presenting...
Beatriz Sanz Baños

The intelligence of IoT

The combination of IoT technology with Artificial Intelligence makes it possible to improve people´s daily lives. This is demonstrated by applications such as virtual assistants or connected smart cities...
Beatriz Sanz Baños

Telefónica IoT and Honda reduce motorbikes robbery

Pucallpa, located in the middle of the Peruvian jungle, has a big concern with the safety of their citizens and their vehicles. With a population of 200.000 inhabitants, the motorcycle...
Álvaro Alegría

Macro data, macro responsibility

On the 11th April 1945, just two days before his death, during the celebrations of Jefferson Day, Franklin D. Roosevelt uttered a phrase that would remain forever in history:...
Stefan Leadbeater

AKQA uses AI to develop a completely new sport

As we already know, AI technologies are being used both within sports and to create new sports, but these tend to be very similar to sports which already exist with slight...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths

How the “antimalware” XProtect for MacOS works and why it detects poorly and badly

Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)

In the first part of this article we explained how Bayesian inference works. According to Norman Fenton, author of Risk Assessment and Decision Analysis with Bayesian Networks: Bayes’ theorem is...
Stefan Leadbeater

DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology

DeepMind has partnered with Moorfields Eye Hospital to develop a diagnostic technology to bring to market, which can help to detect the early signs of sight-threatening conditions, which, through...

Navegación de entradas

Previous articles
1 … 74 75 76 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration