Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The “Cable Girls” of today “The client seeks to live a different experience with each purchase”
  • Big Data
    • The Deep Learning Hype 5 Big Data and AI Startups to watch out for in 2017
  • Cybersecurity
    • Cyber Security Weekly Briefing 5-11 March Meet #LadyHacker Jess Woods, Cloud expert at Telefónica Tech

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

ElevenPaths

ElevenPaths Announces Strategic Security Alliance with Devo

Provides Telefónica Customers Advanced Cybersecurity Monitoring and Protection Services Through Devo Data Operations Platform. Madrid- Thursday 14th of June, 2018. ElevenPaths, the Telefónica Cybersecurity Unit, specialized in development of innovative...
Beatriz Sanz Baños

A world-champion IoT

Are you ready for the soccer World Cup? If not, you should probably start getting ready: this event, which along with the Olympics is considered the most important sporting...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern AI can achieve the impressive performance in perception & recognition tasks mentioned in...
ElevenPaths

#CyberSecurityPulse: Changing stereotypes in the security sector

Ripples of outrage spread across the cybersecurity industry last week after women in red evening gowns were seen promoting a product at the Infosecurity Europe 2018 conference. The event’s...
AI of Things

Big Data Analytics, but what type?

In today’s climate, businesses are already aware that if they don’t make the most of their data, they will be left behind by the competition. They know that traditional...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part I)

A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
Beatriz Sanz Baños

5 IoT elements to improve the customer experience in your store

There are fewer and fewer sectors that can ignore Internet of Things. What started as a tech trend focused on home security and personal exercise has evolved in such a...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
ElevenPaths

New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere

You all know Metashield. Basically, it is a technology from our own to analyze and clean metadata, that is used in several of our own products. Although metadata seems...
Richard Benjamins

Will GDPR’s “right to data portability” change the data industry forever?

After years of preparation, on May 25 2018, the new General Data Protection Regulation (GDPR) has come into force.  Much has been written, discussed and speculated about it. Over...

Navegación de entradas

Previous articles
1 … 90 91 92 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration