Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Barcelona, Singapore and Amsterdam: sustainable cities thanks to Internet of Things Programming languages in the IoT era
  • Big Data
    • Using Data to Manage Emergency Situations Smart football stadiums: the world’s greatest show, made even better
  • Cybersecurity
    • Challenges and Business Opportunities of Post Quantum Cryptography Cyber Security Weekly Briefing, 28 May – 3 June

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’
ElevenPaths

Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’

In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for one detail: their lack of...
Olivia Brookhouse

Would you let Artificial Intelligence run Christmas?

Artificial Intelligence and Big Data are transforming the workplace, providing real time insights to optimize decision making. Meanwhile at home, AI embedded home devices and online applications can accurately...
Beatriz Sanz Baños

The trip experience starts at the airport

Madrid, December 6, 2019, 11:00 a.m. César starts his vacation today. He is very excited because it will be the first time he travels to Asia. He begins an exciting...
Sarah Rojewski

Transformation of customer service and sales in Germany with Aura

I was invited to the event “Women in AI & Data” organized by databricks and hosted by Microsoft in Munich. It seems like a trendy topic but the founder...
AI of Things

Success Story: LUCA Transit and Highways England

The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
AI of Things

Success Story: Using Big Data to improve Tourism with Iberostar

In today’s data story, we talk about some of the main applications of Big Data and Artificial Intelligence within the tourism sector. In this case, the hotel chain, Iberostar,...
AI of Things

Artificial Intelligence in the Industrial Sector: the success story of Repsol

Although technological advances have been left behind in recent years, the industrial sector presents opportunities for developpment in the field of Big Data and Artificial Intelligence, and also in...
Olivia Brookhouse

The Big Data behind Black Friday

It is often the products that seem to have “come out of nowhere” that suddenly experience rocket sales and have everyone talking. Whether its health fads such as...
Beatriz Sanz Baños

The Smart mining revolution

The integration of IoT in smart mining manages to connect its employees with their work environment, providing different benefits that reduce the percentage of accidents. Since its inception, safety has...
New App to Clean Metadata More Easily
Sergio de los Santos

New App to Clean Metadata More Easily

We are not going to repeat the dangers of metadata, since it has been discussed for quite some time now. However, we can try to make its management and cleaning simpler. Some...

Navegación de entradas

Previous articles
1 … 65 66 67 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration