Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart Agriculture: from the plow to the drone We apply quantum technology to real use cases of Blockchain and IoT
  • Big Data
    • Safer Societies using Facial Recognition Groundbreaking study exposes the extent of UK gender bias
  • Cybersecurity
    • Cyber Security Weekly Briefing, 1 — 8 July How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Digital Transformation

Photo: Bruce Mars / Unsplash
Telefónica Tech

Time to start planting digital seeds for the future?

Preparing business operations for the future of work is one of the defining problems of our time. Organisations the world over are now at the stage where their choice of...
Dani Aldea
Telefónica Tech

‘Choosing people to whom you can entrust is one of the biggest challenges for entrepreneurs’, Dani Aldea – Altostratus

Altostratus is a specialised company in software development and digital transformation processes. Tell us about its beginnings, how did the idea come about? The idea came about in 2009, when...
Cybersecurity for industrial digitalisation: keys to a successful approach
ElevenPaths

Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration