Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Using Smart Chatbots as an IoT interface Waste Management in a Smart City – The Smart Bin
  • Big Data
    • Hackathons are not just for developers Artificial Intelligence – Five Fears Explained
  • Cybersecurity
    • ElevenPaths further strengthens its reputation as a cybersecurity services provider Do I Really Need an Antivirus?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

edge computing

AI of Things

Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
Nacho Palou

Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone

Raspberry Pi is a popular computer widely used among developers, students and fans of computing, robotics, and gadgetry. Among its virtues are its low cost (a basic kit costs...
Nacho Palou

Edge AI: Artificial Intelligence outside Cloud

Edge AI refers to the execution of AI algorithms near or on devices such as wearables, mobiles, cameras, IoT (Internet of Things) sensors or edge servers, which the ability...
Photo: Denys Nevozhai / Unsplash
Emilio Moreno

Latency and Edge Computing: Why is it important?

For many years we have been in a race to increase the speed of our connections. Ever since those modems that treated us to a symphony of beeps, the...
Marta Nieto Gómez-Elegido

Edge Computing, 3 case studies   

2021 was a turning point for the arrival of Edge Computing in our lives. Newscasts, written press, social networks, chats among friends… This term did not escape from any...
Photo: Tai Jyun / Unsplash
Alfonso Ibañez

Edge Computing and Machine Learning, a strategic alliance

By Alfonso Ibáñez and Aitor Landete Nowadays, it is not unusual to talk about terms such as Artificial Intelligence or Machine Learning. Society, companies and governments are increasingly aware of...
Edge Computing
Carlos Rebato

Edge Computing Made Simple

Edge computing is one of the technologies that will define and revolutionise the way in which humans and devices connect to the internet. It will affect industries and sectors...
Life on the border
Emilio Moreno

Life at the border

Today’s article is not going to be about cowboy movies, nor about the Limes of the Roman Empire, nor about Radio Futura’s song even though it may seem like...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...
Edge and Virtual Reality
Marta Nieto Gómez-Elegido

Edge Computing and Virtual Reality, new classmates

It’s been a little while since the new school year started. New subjects, new challenges and new classmates. Among them, one name is becoming increasingly heard: Edge Computing. Thanks to...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration