Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project Have you ever wondered where the energy comes from?
  • Big Data
    • Coca-Cola’s use of AI to stay at the top of the drinks market Big Data and Artificial Intelligence solutions for the tourism industry
  • Cybersecurity
    • Google’s Passkey is just another nail in the password coffin And the President Said, “Enough Is Enough”. The New Cyber Security Proposals from The White House
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

IoT Connectivity

Nacho Palou

Satellites with 5G technology to provide IoT coverage worldwide

During the last edition of MWC, our colleague Javier Zorzano participated in the “5G IoT Summit: Hybrid NB-IoT and Satellite Solutions” alongside Shahbaz Ali, from Sateliot. In their talk,...
Olivia Brookhouse

When will Robots find a place in the Smart Home?

With the mass introduction of smart speakers, smart doorbells, smart fridges and even smart toilets there is a world of possibilities when it comes to innovating our homes. Whilst...
Olivia Brookhouse

IoT and Big Data in football to enable intelligent decision making

IoT and Big Data in sport are becoming ever more prevalent, bringing value to not only players but spectators too. Football, although a seemingly basic sport with a just...
AI of Things

What is a connected car and how can it improve the driving experience?

Every day, we are surrounded by devices that are connected to the Internet. We only need to turn our eyes in any direction, and we can see televisions, coffee...
Olivia Brookhouse

The Big Data and IoT applications fighting coronavirus

The coronavirus pandemic has truly turned our lives upside down, changing how we work, study and interact in every way. The global health crisis has tested every government’s ability...
Olivia Brookhouse

IoT and Big Data, essential technologies for Rugby Union

Next in our series of #IoTinSport we are focusing on the innovation of IoT and Big Data in the sport of Rugby. Using IoT devices within sport allows coaches...
Olivia Brookhouse

What is IoT: Solutions and future applications

Are you interested in finding out what is the Internet of Things (IoT)? It is an ever-growing technology which opens doors to new opportunities in multiple sectors ranging from...
Beatriz Sanz Baños

Make your holidays run smoothly with IoT

The arrival of summer holidays allows us to visit our favorite destinations, but who isn´t worried about losing their suitcase when travelling? Luckily, IoT help us to have everything...
Beatriz Sanz Baños

Innovating with IoT

Startups create products and technological solutions that anticipate the needs of the future, helping us in the transition to the digital age. However, they need resources so that time...
Luis Simón Gómez Semeleder

IoT is on your head

There are many Jobs in which protecting your head is vital to avoid serious accidents, but can you imagine being protected beyond the blows that a helmet prevents? And...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration