Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The importance of labeling: spotlabel Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project
  • Big Data
    • What role will Data Governance play in the Digital Transformation after COVID-19? Our Christmas Lip Sync
  • Cybersecurity
    • MWC: All the innovations and expertise we shared #CyberSecurityPulse: Biggest-Ever DDoS Attack Hits Github Website
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Ismael Rihawi

Graduate in Computer Engineering with a Master's Degree in Big Data and Business Intelligence and a Postgraduate Degree in Bitcoin and Blockchain. Fromer Expert Data Engineer at Telefónica Tech IoT & Big Data, bringing order to the chaos of data. In my free time I love to play the guitar and running.



Ismael Rihawi

Artificial Intelligence, IoT, and Blockchain: surfing the “Third Wave”

Back in 1980, futurologist Alvin Toffler published The Third Wave, a book inspired by Steve Case to express his vision of the development of the information technology paradigm in...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration