Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Have you ever wondered where the energy comes from? 5 reasons why everyone wants to learn Python
  • Big Data
    • 4 Brazilian cities using data to plan urban mobility What do Big Data, Algorithms and Netflix have in common?
  • Cybersecurity
    • #CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products People at the core of our technology
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

AI of Things

AI of Things, one Telefonica Tech´s business unit, helps its customers in their digital transformation process by unifying IoT, Artificial Intelligence, Big Data and Blockchain capabilities.



AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part II)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this article, the second about our experiment using Reinforcement Learning (RL) and Deep Learning in...
AI of Things

Business Messaging – From humble SMS to conversational commerce

Written by Jenny Whelan, Head of Business Affairs – LUCA Advertising We all know SMS. With 5 billion users, the reach of SMS as a messaging channel is unparalleled. Combined...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern AI can achieve the impressive performance in perception & recognition tasks mentioned in...
AI of Things

Big Data Analytics, but what type?

In today’s climate, businesses are already aware that if they don’t make the most of their data, they will be left behind by the competition. They know that traditional...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part I)

A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
AI of Things

Podcast #1: The Challenges of working with data

This is the first of a series of podcasts where, Richard Benjamins, Data & AI Ambassador for Telefonica/LUCA, will share with us his thoughts and reflexions about these Technologies. Richard...
AI of Things

Ready for a Wild World: Big Data is key for humanitarian issues

The Big Data for Social Good event organized by LUCA, “Ready for a Wild World“, took place on May 24th and brought together experts from relevant global organizations and...
AI of Things

GDPR 101: What you need to know

On 25 May, the much talked about General Data Protection Regulation (GDPR), came into force. This new regulation has the primary objective of governing the gathering, using and sharing...
AI of Things

Our 5 Favorite Free Data Courses

Although it might seem like a nearly impossible feat, it is never too late to learn about Big Data, Machine Learning, and everything in between. You can get test...

Navegación de entradas

Previous articles
1 … 7 8 9 … 25
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration