Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Trends for 2018, connectivity in the limelight What is the difference between M2M and IoT?
  • Big Data
    • The Big Data and IoT applications fighting coronavirus Weve launches Weve Locate – Location verification technology
  • Cybersecurity
    • 0days in numbers: Chrome, Windows, Exchange… What are attackers and manufacturers looking for? Cyber Security Weekly Briefing 9-15 October
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

English

AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
AI of Things

Business Messaging – From humble SMS to conversational commerce

Written by Jenny Whelan, Head of Business Affairs – LUCA Advertising We all know SMS. With 5 billion users, the reach of SMS as a messaging channel is unparalleled. Combined...
AI of Things

Meet the Hyperconnected Museums of the Future

Today, Friday 18th May, museum all around the globe are taking part in the International Museum Day. This is an annual event organized by the International Council of Museums...
AI of Things

Using Data to Manage Emergency Situations

Content originally written by Carmen Rodríguez, intern at LUCA, and Javier Carro, Data Scientist within LUCA’s Big Data for Social Good area. What would you say if we told you...
AI of Things

Are you Ready for a Wild World? Don’t miss out on Big Data for Social Good 2018!

Ready for a Wild World? Our next Big Data for Social Good event will be dedicated to Climate Change and Disaster Preparedness Although we often associate Big Data with worries...
AI of Things

Data and Human Resources: a close relationship

We live in an era of burnout, information overload and a battle for work-life balance. More and more, we can see the evolution of Human Resources (HR) into not...
AI of Things

First results of the OOH advertising project in Brazil

On the 26th March, Clear Channel, JCDecaux and Otima presented the results of the OOH map campaigns in Rio de Janeiro and São Paulo that were carried out alongside...
AI of Things

Data Attributes: the new Digital Identity Currency

The 2018 edition of the Mobile World Congress took place in Barcelona between the 25th and 28th of February. During the event, a panel discussion took place that featured...
AI of Things

ProTrain Project: Big Data to optimise regional traffic in Germany

Transport planning within major cities is becoming a worldwide issue as more and more people are moving to cities like Berlin which in turn has put urban transport under...

Navegación de entradas

Previous articles
1 2 3 … 12
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Cryptographic Security in IoT (II)
The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration