Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things for smart and sustainable water management AI of Things(I): Multiplying the value of connected things
  • Big Data
    • Artificial Intelligence in the Industrial Sector: the success story of Repsol Feel Free to browse: How online retailers are driving sales with sponsored data
  • Cybersecurity
    • Digital Identity Wallets against identity theft fraud Cyber Security Weekly Briefing, 21 – 27 January
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Machine Learning

Santiago Morante Cendrero

Warning About Normalizing Data

For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
AI of Things

Big Data & AI changing the music game: IBM Watson BEAT

Music is something that unites us. Go anywhere in the world and you will find music: someone singing, playing, rapping or dancing. For thousands of years it has formed...
AI of Things

Human Intelligence driving AI: Demand for Data Scientists

Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Richard Benjamins

How to fund your data journey

As of 2018, most large multinationals have started their journey to become a more data-driven organization, usually as part of their digital transformation. For most of them, it is...
AI of Things

Data Roles: Which is the right one for you?

The world of Data, Machine Learning and Artificial Intelligence is so vast and varied, that it becomes necessary to define different profiles. Throughout this post we will describe each...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part III)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this post, we will offer details about the architectures chosen for our models, the logic that the agent follows during the training,...
AI of Things

LUCATalk Recap: 6 challenges for Artificial Intelligence’s sustainability and what we should do about it

<If you're interested in Artificial Intelligence, you already know that it has many benefits and successful uses. It can improve the diagnosis and treatment of cancer, optimize the management...
AI of Things

Our 5 Favorite Free Data Courses

Although it might seem like a nearly impossible feat, it is never too late to learn about Big Data, Machine Learning, and everything in between. You can get test...
AI of Things

Meet the Hyperconnected Museums of the Future

Today, Friday 18th May, museum all around the globe are taking part in the International Museum Day. This is an annual event organized by the International Council of Museums...
AI of Things

Data and Human Resources: a close relationship

We live in an era of burnout, information overload and a battle for work-life balance. More and more, we can see the evolution of Human Resources (HR) into not...

Navegación de entradas

Previous articles
1 2 3 4
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration