AI of Things 5 AI uses in Photography On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
Stefan Leadbeater Driverless cars…a reality or a distant dream? More and more we are seeing different companies developing what they are calling driverless cars, which, in reality are nothing more than cars which have certain aspects of autonomous...
Diego Martín Moreno What are Blockchain and Smart Contracts? Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
AI of Things Blockchain and IoT predictions for 2019 Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
Paloma Recuero de los Santos Python for all (4): Data loading, explorative analysis and visualisation Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
Paloma Recuero de los Santos Python for all (2): What are Jupyter Notebooks? What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
AI of Things 4 trends in technology for 2019 Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...
AI of Things What GDPR laws mean for you Post written by Rodrigo Machado – Head of Technology, Mobile Advertising General Data Protection Regulation – GDPR, the new EU regulation that has been designed to update the existing data...
AI of Things A history of Lisp and its use in neural networks – Part I Written by Sergio Sancho Azcoitia, Security Researcher for ElevenPaths Today we kick off a new series that will consist in two articles in which we will briefly introduce you to...
AI of Things Do not miss what happened at NID 2018: WE ARE IN Under the claim We are in, Telefónica developed the Network Innovation Day 2018 (#NID2018) on July 14th. This was the first annual innovation event of the network, which aims...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick Who are you going to believe, me or your own eyes? The dilemma of managed security Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...