Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Internet of the Best 5 AI uses in Photography
  • Big Data
    • LUCA reshapes tourism insights at SDWC 2017 Predictive Analysis and Machine Learning improving quality of life for refugees
  • Cybersecurity
    • Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later Homeworking: Balancing Corporate Control and Employee Privacy (I)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

edge computing

Moncho Terol

Edge Computing and Cyber Security: Benefits and Challenges

Digital transformation and economic growth are two key themes, closely related to the future of connectivity. One of the most important challenges that organisations of all types face in...
Edge Computing
Moncho Terol

How Connectivity Is Evolving Through Optical Fibre and Edge Computing

Every process involves efforts, trials and improvements in order to achieve overall success. The efforts that have been made in relation to connectivity are countless . Gone are the days...
AI of Things

4 trends in technology for 2019

Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...

Navegación de entradas

Volver a portada
1 2
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration