Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Drones in Precision Farming The Champions is also IoT
  • Big Data
    • Fighting Fraud: The $3.7 trillion black hole facing today’s organizations Artificial Intelligence for warfare or for maintaining peace
  • Cybersecurity
    • Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines Cyber Security Weekly Briefing 2-8 October

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

AI of Things

Visual Object Detection Transforms Manufacturing Industries

The automation trend is being accelerated by daily advances in Artificial Intelligence and Deep Learning. In the manufacturing industry, the automation of tasks by machines has become one of...
Cascajo Sastre María

Sweet dreams with IoT

The development of Internet of Things has changed our society and multiple sectors like Industry, Retail, construction or mobility in cities among others. This technology makes life easier for people in many areas; one of them is comfort and...
Beatriz Sanz Baños

Your assets controlled with a click: Things Ready Link

In an increasingly digital world, technology innovation is an essential value. The adoption of new technologies and connectivity possibilities of Internet of Things (IoT) provides a great competitive advantage...
Open source maintainer burnout as an attack surface
ElevenPaths

Open source maintainer burnout as an attack surface

Introduction Software development has evolved greatly in the last decades. It is leaning towards an scenario based in third-party modules, components and libraries that help accelerate the development of our...
ElevenPaths

New report: Twitter botnets detection in sports event

We all know that a botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform DDoS attacks,...
Beatriz Sanz Baños

Worker’s Diary IoT III

18:00. Daniel arrives at school to pick up his children. He knows that they are still inside thanks to the trackers in their backpacks . While he is waiting for them, he can check the daily news on his smartwatch. When the children get in...
AI of Things

Fake news, literally

The BBC recently launched a test, joining forces with software company Synthesia, to manipulate the speech of BBC newsreader Mathew Amroliwala. The presenter only speaks English, but the artificially...
AI of Things

An Artificial Intelligence capable of designing medicines from scratch

The applications of AI in the pharmaceutical world are well known. But did you know Artificial Intelligence can also help create new medicines? The applications of AI that many people...
Beatriz Sanz Baños

IoT in Hotels

The digitization of the economy is reaching all areas of our society. One sector that is more evolved with the application of Internet of Things is tourism. More and...
Beatriz Sanz Baños

The potential of IoT devices in education

Paying in a store, controlling the vacuum cleaner from the mobile or the refrigerator detecting a shortage of the apples we like and making the purchase autonomously, etc… these things...

Navegación de entradas

Previous articles
1 … 80 81 82 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration