Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Success Story: achieving an audience based strategy Your children’s toys are now connected
  • Big Data
    • Rebuilding Mocoa with Big Data Could brainwave analysis turn eSport gamers into elite athletes?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 17 — 23 September Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

edge computing

AI of Things

Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
Nacho Palou

Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone

Raspberry Pi is a popular computer widely used among developers, students and fans of computing, robotics, and gadgetry. Among its virtues are its low cost (a basic kit costs...
Nacho Palou

Edge AI: Artificial Intelligence outside Cloud

Edge AI refers to the execution of AI algorithms near or on devices such as wearables, mobiles, cameras, IoT (Internet of Things) sensors or edge servers, which the ability...
Photo: Denys Nevozhai / Unsplash
Emilio Moreno

Latency and Edge Computing: Why is it important?

For many years we have been in a race to increase the speed of our connections. Ever since those modems that treated us to a symphony of beeps, the...
Marta Nieto Gómez-Elegido

Edge Computing, 3 case studies   

2021 was a turning point for the arrival of Edge Computing in our lives. Newscasts, written press, social networks, chats among friends… This term did not escape from any...
Photo: Tai Jyun / Unsplash
Alfonso Ibañez

Edge Computing and Machine Learning, a strategic alliance

By Alfonso Ibáñez and Aitor Landete Nowadays, it is not unusual to talk about terms such as Artificial Intelligence or Machine Learning. Society, companies and governments are increasingly aware of...
Edge Computing
Carlos Rebato

Edge Computing Made Simple

Edge computing is one of the technologies that will define and revolutionise the way in which humans and devices connect to the internet. It will affect industries and sectors...
Life on the border
Emilio Moreno

Life at the border

Today’s article is not going to be about cowboy movies, nor about the Limes of the Roman Empire, nor about Radio Futura’s song even though it may seem like...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Edge and Virtual Reality
Marta Nieto Gómez-Elegido

Edge Computing and Virtual Reality, new classmates

It’s been a little while since the new school year started. New subjects, new challenges and new classmates. Among them, one name is becoming increasingly heard: Edge Computing. Thanks to...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration