Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Kevin Ashton just asks companies to use the IoT How IoT and Big Data is elevating Energy Management
  • Big Data
    • Stanford University’s “Women in Data Science” to debut in Madrid AI in Advertising: Prediciting Trends or Reinforcing Stereotypes?
  • Cybersecurity
    • Technology and the young: how to turn dangers into opportunities The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Big Data

AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
Richard Benjamins

Will GDPR’s “right to data portability” change the data industry forever?

After years of preparation, on May 25 2018, the new General Data Protection Regulation (GDPR) has come into force.  Much has been written, discussed and speculated about it. Over...
AI of Things

Podcast #1: The Challenges of working with data

This is the first of a series of podcasts where, Richard Benjamins, Data & AI Ambassador for Telefonica/LUCA, will share with us his thoughts and reflexions about these Technologies. Richard...
AI of Things

Ready for a Wild World: Big Data is key for humanitarian issues

The Big Data for Social Good event organized by LUCA, “Ready for a Wild World“, took place on May 24th and brought together experts from relevant global organizations and...
AI of Things

GDPR 101: What you need to know

On 25 May, the much talked about General Data Protection Regulation (GDPR), came into force. This new regulation has the primary objective of governing the gathering, using and sharing...
AI of Things

Our 5 Favorite Free Data Courses

Although it might seem like a nearly impossible feat, it is never too late to learn about Big Data, Machine Learning, and everything in between. You can get test...
AI of Things

Meet the Hyperconnected Museums of the Future

Today, Friday 18th May, museum all around the globe are taking part in the International Museum Day. This is an annual event organized by the International Council of Museums...
AI of Things

Download your eBook, The Data Economy: Wealth 4.0

Last month, the Telefonica Foundation, in collaboration with Afi (International Financial Analysts), Ariel and Editorial Planeta, published “The Data Economy: Wealth 4.0” which we at LUCA invite you to...
AI of Things

A formula for Victory: Big Data in Formula 1

Japan 1990, most die-hard Formula 1 fans remember the eventful race in Suzuka circuit. As was usual during the late 80’s and early 90’s, Ayrton Senna and Alain Prost,...
AI of Things

Using Data to Manage Emergency Situations

Content originally written by Carmen Rodríguez, intern at LUCA, and Javier Carro, Data Scientist within LUCA’s Big Data for Social Good area. What would you say if we told you...

Navegación de entradas

Previous articles
1 … 21 22 23 … 43
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration