Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Internet of the Best The era of a connected society
  • Big Data
    • Planning retail site locations using data How to measure your data maturity?
  • Cybersecurity
    • How language puts business Cybersecurity at risk Metaverse (II): the challenge of building a virtual space that is secure, inclusive and beneficial to everyone
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cloud

Edge Computing
Moncho Terol

How Connectivity Is Evolving Through Optical Fibre and Edge Computing

Every process involves efforts, trials and improvements in order to achieve overall success. The efforts that have been made in relation to connectivity are countless . Gone are the days...
edge-computing-smes
Roberto García Esteban

Cloud Computing Is the Lifeline for SMEs

Cloud Computing is an essential technology in companies’ business continuity plans, and this has been made very clear in the context of the Covid-19 pandemic. It is said that...
Acens header
Telefónica Tech

Success Story: AWS by Acens, The Solution Chosen by Forcemanager for its CRM for Sales Team Management

Telefónica Tech integrates acens into its ecosystem, a pioneering company in the development of Cloud solutions. This completes the value proposition of IT services for small and medium-sized companies. Acens...
Social Media blog
Telefónica Tech

We’re talking about technology, will you join the conversation?

It is increasingly common to come across concepts such as Big Data, Artificial Intelligence, Internet of Things, Cyber Security, Cloud or Blockchain in any field and any conversation, disruptive...

Navegación de entradas

Volver a portada
1 … 5 6
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration