Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Sweet dreams with IoT Telefónica IoT and Honda reduce motorbikes robbery
  • Big Data
    • COVID-19 Shines a light on the huge possibilities of AI in Education Big Data: moneymaker and force for social good?
  • Cybersecurity
    • Cybersecurity Shot_MUPOL Information Leakage Cyber Security Weekly Briefing 28 November – 4 December
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Guillermo Caminero Fernández

Graduado en Ingeniería de Telecomunicaciones con especialidad en electrónica y master en Ingeniería de Telecomunicaciones por la Universidad de Valladolid. Apasionado por la tecnología, la electrónica, el hacking y en especial la inteligencia artificial. Experiencia en modelos de deep learning en concreto para la rama de visión por computador. Actualmente es Data Scientist en el área AI & Analytics Services de Telefónica IOT & Big Data Tech.



Robot playing piano. Photo: Possessed Photography / Unsplash
Guillermo Caminero Fernández

AI of Things (VI): Generative Artificial Intelligence, creating music to the rhythm of perceptron

In recent years, the number of AI (Artificial Intelligence) models that are used to generate synthetic information has exploded. One of the most famous, and one that has been...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration