AI of Things LUCA Talk: RCS for Business Messaging, a New Generation It is undeniable that we are in the midst of a revolution in communications. With more than five billion active accounts in mobile messaging applications and a strong upward...
Paloma Recuero de los Santos Python for all (5): Finishing your first Machine Learning experiment with Python We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
Paloma Recuero de los Santos Python for all (4): Data loading, explorative analysis and visualisation Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
Paloma Recuero de los Santos Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need? We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries. We will see what purpose some of them...
Paloma Recuero de los Santos Python for all (2): What are Jupyter Notebooks? What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Paloma Recuero de los Santos Python for all (1): Installation of the Anaconda environment Now that we have defined the objective of this tutorial in the previous post (“Dare with the Python: an experiment for all”), we will really begin to work. We...
Paloma, Recuero de los Santos Dare with Python: An experiment for all (intro) As we did in our experiment on the Titanic dataset in Azure Machine Learning Studio, we will continue with the “Learning by doing” strategy because we believe that the...
Santiago Morante Cendrero Warning About Normalizing Data For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
AI of Things Deep Learning vs Atari: train your AI to dominate classic videogames (Part II) Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this article, the second about our experiment using Reinforcement Learning (RL) and Deep Learning in...
AI of Things Deep Learning vs Atari: train your AI to dominate classic videogames (Part I) A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick New tool: Maltego transforms for Tacyt If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...