Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC 2017: The evolution of connectivity and new uses for IoT The emotions of IoT
  • Big Data
    • Understanding the visitors of the Reina Sofia Museum in Madrid Artificial Intelligence: a “very human” technology
  • Cybersecurity
    • The attack against OpenPGP infrastructure: consequences of a SOB’s actions Cyber Security Weekly Briefing 1–8 April
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

IoT Industry & Energy

Nacho Palou

Satellites with 5G technology to provide IoT coverage worldwide

During the last edition of MWC, our colleague Javier Zorzano participated in the “5G IoT Summit: Hybrid NB-IoT and Satellite Solutions” alongside Shahbaz Ali, from Sateliot. In their talk,...
Diego Samuel Espitia

Cybersecurity in OT: a need with differences

Cyber incidents in industrial environments have been increasing significantly since 2010, but it is undoubtedly in the 2020s that these incidents have affected the general population or made the...
Patrick Buckley

The Future of the Construction Industry is Upon Us

Cost overruns, delays, work-related accidents and expensive misunderstandings are everyday challenges which continue to plague the construction industry worldwide. In today’s post, we explore how the construction industry can...
Patrick Buckley

How IoT and Big Data is elevating Energy Management

Increasingly, energy management is becoming a topic of great social importance. In today’s post, I will explain how IoT (Internet of Things) together with technology Artificial Intelligence (AI),...
Olivia Brookhouse

Advances of Industria 4.0 and its impact on society

We are currently living at a time where technology is heavily present in our lives. One of the greatest advances has to be the development of Industry 4.0, known...
Beatriz Sanz Baños

The heart of the airports pumps with IoT

The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
Beatriz Sanz Baños

Have you ever wondered where the energy comes from?

Thousands of companies and households have already use solar energy, with the dual purpose of reducing the carbon footprint of the planet and actively control their consumption. Have you already joined...
Fernando García Gómez

Fleet Optimise for Rent-a-car Companies

Fleet Optimize enables car rental companies to create new revenue streams, reduce the operating costs of vehicle fleets and improves the safety and customer experience.
Luis Simón Gómez Semeleder

IoT is on your head

There are many Jobs in which protecting your head is vital to avoid serious accidents, but can you imagine being protected beyond the blows that a helmet prevents? And...
Beatriz Sanz Baños

Industry 4.0 is much more than Smart Factories

We should start by explaining what Industrial IoT (IIoT) – also known as Industry 4.0 – is. It is undoubtedly as much a revolution as the three previous revolutions...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration