Olivia Brookhouse How to build a Smart City: with IoT and Big Data A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Beatriz Sanz Baños Fleet Optimize for Field Force Smart driving has become a priority for users and companies that want to go further. Can you imagine increasing the profitability and safety of your fleet of vehicles by...
Beatriz Sanz Baños Your city is more accessible with IoT According to the latest data from the National Statistics Institutethere are 3.84 million people with some type of disability in Spain. A figure to bear in mind since it makes...
Fernando García Gómez Waste collection vehicles join the RevolutIOTn What’s the impact of technology in our lives? Undoubtely, it makes our daily life easier both in the personal and profesional field, allowing us to obtain more benefits with less...
Beatriz Sanz Baños Distribution and Logistics Companies IoT technology services are already applied in the distribution and logistics industry to optimize different processes. This has a positive effect on the productivity, security and the preventive maintenance...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Innovation Marketing Team Empowering women in entrepreneurship: 10 female – led startups in Germany In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Sergio de los Santos Frequently Asked Questions About Printnightmare (CVE-2021-34527) We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...