Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Debate about the future of the Connected Industry 4.0 How AI is helping fashion retailers stay afloat
  • Big Data
    • Using Data to Manage Emergency Situations Python for all (1): Installation of the Anaconda environment
  • Cybersecurity
    • Cyber Security Weekly Briefing May 8-14 Security and Privacy on the “Internet of Health”
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Innovation IoT

Olivia Brookhouse

Telefónica Activation Programme: Innovate with IoT

Creating and inventing technological products and solutions. Anticipating the needs of the future and helping the transition to the digital era. Do you know who we are talking about?...
Olivia Brookhouse

Telefónica Activation Programme, how to scale your startup

Today we bring you a post aimed at all you entrepreneurs. According to a study conducted by Wayra, 74% of startups are seeing their business affected by the damage...
Luis Simón Gómez Semeleder

Now cycling is safer thanks to drones and IoT

How many of us don’t feel safe overtaking a bike on the road?  The truth is that while driving a car we could be presented with a dangerous situation,...
Beatriz Sanz Baños

Innovating with IoT

Startups create products and technological solutions that anticipate the needs of the future, helping us in the transition to the digital age. However, they need resources so that time...
Luis Simón Gómez Semeleder

IoT is on your head

There are many Jobs in which protecting your head is vital to avoid serious accidents, but can you imagine being protected beyond the blows that a helmet prevents? And...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration