Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT for Beginners (The Internet of latecomers) How do brands speak to you?
  • Big Data
    • Business Messaging – From humble SMS to conversational commerce Meet the Hyperconnected Museums of the Future
  • Cybersecurity
    • Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Machine Learning

Photo: Tai Jyun / Unsplash
Alfonso Ibañez

Edge Computing and Machine Learning, a strategic alliance

By Alfonso Ibáñez and Aitor Landete Nowadays, it is not unusual to talk about terms such as Artificial Intelligence or Machine Learning. Society, companies and governments are increasingly aware of...
AI of Things

5 AI uses in Photography

On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
Olivia Brookhouse

What is Natural Language Processing and its Use Cases?

Our ability as humans to use words to communicate intelligently is what defines us as a species. There are 7000 languages in the world connected to different countries, cultures...
Olivia Brookhouse

Artificial Intelligence, doing more than humanly possible since the Greeks

Many of those working in the world of Artificial Intelligence acknowledge the 1950’s as the birth of concepts such as Machine Intelligence and Artificial Intelligence with the creation of...
AI of Things

The 2 types of learning in Machine Learning: supervised and unsupervised

We have already seen in previous posts that Machine Learning techniques basically consist of automation, through specific algorithms, the identification of patterns or trends which “hide” in the data. Thus, it...
AI of Things

The future of OpenAI and the alternatives to its end as a non-profit business

Just a few days ago, the well-known research company within the Artificial Intelligence environment, OpenAI, has announced the end of its non-profit operations. Since starting, OpenAI have championed the development and promotion...
Stefan Leadbeater

DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology

DeepMind has partnered with Moorfields Eye Hospital to develop a diagnostic technology to bring to market, which can help to detect the early signs of sight-threatening conditions, which, through...
Stefan Leadbeater

Driverless cars…a reality or a distant dream?

More and more we are seeing different companies developing what they are calling driverless cars, which, in reality are nothing more than cars which have certain aspects of autonomous...
New born gazelle
Rubén Granados

Reinforcement learning…. the new player

Here, we would like to present a ´new´ guest, reinforcement learning (RL). Not as new, because it has been with us since the 80s. We will quickly go over the classic approximations, that...
AI of Things

Machine Learning identifying rare genetic disorders

Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces?  The quantity of genetic illnesses is so...

Navegación de entradas

Volver a portada
1 2 … 4
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration