Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The future of Internet of Things Sweet dreams with IoT
  • Big Data
    • What are the 5 principles of joined-up data? Our 5 Favorite Free Data Courses
  • Cybersecurity
    • Bestiary of a Poorly Managed Memory (II) Towards a green digital transformation
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity

Cristina del Carmen Arroyo Siruela



Photo: ThisIsEngineering / Unsplash
Cristina del Carmen Arroyo Siruela

Women’s Engineering Day: Building New Paths

The Women's Engineering Society (WES) launched the Women's Engineering Day initiative in the UK on June 23, 2014
Photo: Icons8 Team / Unsplash
Cristina del Carmen Arroyo Siruela

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Projected code over a woman
Cristina del Carmen Arroyo Siruela

Differences between encryption, hashing, encoding and obfuscation

There is currently a lot of confusion about the terms encryption, encoding, cryptography, hashing and obfuscation techniques. These terms are related to computer security, specifically to the confidentiality and...
Cristina del Carmen Arroyo Siruela

Monitoring technologies, a key element in cyber security

IDS (Intrusion Detection System), IPS (Intrusion Prevention System) and SIEM solutions are fundamental elements in event monitoring and cybersecurity. IDSs and IPSs are intrusion detection and prevention systems that employ...
Cristina del Carmen Arroyo Siruela

Understanding Digital Certificates

For ordinary citizens, digital certificates are those electronic files or documents that allow them to carry out thousands of legal actions, administrative actions, and they can dispense with having...
Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo
Dark Markets in the internet age
What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
Alexandre Maravilla
Web3 and the evolution of Internet Identity
The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...
AI of Things
5 AI uses in Photography
On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
cocacola
AI of Things
Coca-Cola’s use of AI to stay at the top of the drinks market
Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration