Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT and Big Data in football to enable intelligent decision making MWC 2017: The evolution of connectivity and new uses for IoT
  • Big Data
    • Data to build a better construction sector A formula for Victory: Big Data in Formula 1
  • Cybersecurity
    • Cyber Security Weekly Briefing January 9-15 Facebook signed one of its apps with a private key shared with other Google Play apps since 2015

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Beatriz Sanz Baños

Medical video assistance thanks to IoT

Much has been said about the arrival of Internet of Things in numerous sectors such as industry, home automation or even leisure, but little, however, of its application to...
Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
The hugest collection of usernames and passwords has been filtered…or not (II)
ElevenPaths

The hugest collection of usernames and passwords has been filtered…or not (II)

Over the last entry we focused on analyzing the content of these files from a critical point of view, this is: on clarifying that when a massive leak freeing...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Beatriz Sanz Baños

Bed time will never be the same

Internet of Things has proven to be very useful in improving people’s lives in areas such as health and personal rest. This technology has also been proven to help...
Salmerón Uribes Marina

“The client seeks to live a different experience with each purchase”

“The music of nougat “El Almendro” is recognized by one hundred percent of the respondents” We all take it for granted when entering a hotel, a cafeteria or a supermarket...
Paloma Recuero de los Santos

Python for all (2): What are Jupyter Notebooks?

What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Gonzalo Álvarez Marañón

Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
Carlos Alberto Lorenzo Sandoval

Towards the Fourth Industrial Revolution

The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...
The hugest collection of usernames and passwords has been filtered…or not
ElevenPaths

The hugest collection of usernames and passwords has been filtered…or not (I)

Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...

Navegación de entradas

Previous articles
1 … 78 79 80 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration