Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Hologram Concert – How AI is helping to keep music alive Smart Agriculture: from the plow to the drone
  • Big Data
    • 4 reasons why you should visit the LUCA stand at MWC2017 Improving intent to purchase with mobile advertising: Success Story of Milpa Real
  • Cybersecurity
    • Tips to Download Apps Securely ElevenPaths and BitSight deliver enhanced visibility into supply chain risk with continuous monitoring

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Why you are late delivering all your projects and what you can do to address it
ElevenPaths

Why you are late delivering all your projects and what you can do to address it

Anyone who causes harm by forecasting should be treated as either a fool or a liar. Some forecasters cause more damage to society than criminals. —Nassim Taleb, The Black Swan, 2007 In 1957,...
AI of Things

The future of OpenAI and the alternatives to its end as a non-profit business

Just a few days ago, the well-known research company within the Artificial Intelligence environment, OpenAI, has announced the end of its non-profit operations. Since starting, OpenAI have championed the development and promotion...
Mirian Martinez Varas

MWC 2018: How Telefónica will create a better future with IoT

On February 26, the MWC 2018 will be launched, a new tech gathering where the most important and innovative firms in the technology industry will meet. And naturally, Telefónica will be there presenting...
Beatriz Sanz Baños

The intelligence of IoT

The combination of IoT technology with Artificial Intelligence makes it possible to improve people´s daily lives. This is demonstrated by applications such as virtual assistants or connected smart cities...
Beatriz Sanz Baños

Telefónica IoT and Honda reduce motorbikes robbery

Pucallpa, located in the middle of the Peruvian jungle, has a big concern with the safety of their citizens and their vehicles. With a population of 200.000 inhabitants, the motorcycle...
Álvaro Alegría

Macro data, macro responsibility

On the 11th April 1945, just two days before his death, during the celebrations of Jefferson Day, Franklin D. Roosevelt uttered a phrase that would remain forever in history:...
Stefan Leadbeater

AKQA uses AI to develop a completely new sport

As we already know, AI technologies are being used both within sports and to create new sports, but these tend to be very similar to sports which already exist with slight...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths

How the “antimalware” XProtect for MacOS works and why it detects poorly and badly

Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
ElevenPaths

How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)

In the first part of this article we explained how Bayesian inference works. According to Norman Fenton, author of Risk Assessment and Decision Analysis with Bayesian Networks: Bayes’ theorem is...
Stefan Leadbeater

DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology

DeepMind has partnered with Moorfields Eye Hospital to develop a diagnostic technology to bring to market, which can help to detect the early signs of sight-threatening conditions, which, through...

Navegación de entradas

Previous articles
1 … 74 75 76 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration