Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Activation: the IoT Program for Startups IoT Trends for 2018, connectivity in the limelight
  • Big Data
    • Artificial Intelligence: a “very human” technology GDPR 101: What you need to know
  • Cybersecurity
    • Cybersecurity and Pandemic (I): People Secure Homeworking, Applying Cybersecurity from Home

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Global

Recap Advanced Factories
Telefónica Tech

Telefónica Tech was Present at Advanced Factories 2021 With Its Proposal For The Industrial Sector

On the 8th, 9th and 10th of June, the 5th edition of the Advanced Factories event was held in Barcelona, a major event in Spain on industrial automation, robotics...
Matilde de Almeida

Matching startups: virtual medical assistance and 5G-connected ambulance with Visionable

Innovating within a company is not an easy task, but it is necessary, and the business development team at Telefónica Open Innovation, takes care of just that. We attempt...
Beatriz Sanz Baños

Road safety and IoT

Mobility is one of the key factors to consider in order to make cities more efficient, a necessity taking into account the millions of citizens travel to work or study centers in their vehicles. Taking...
Fernando Menéndez-Ros

Aura arrives in Colombia to transform the relationship with its customers

During the Andicom International ICT Congress, which took place last Friday in Cartagena de Indias (Colombia), the CEO of Telefónica Movistar in Colombia, Fabián Hernández, announced the launch of...
Beatriz Sanz Baños

The Champions is also IoT

IoT technology makes the Wanda Metropolitano football stadium one of the most advanced in the world, thanks to its great connectivity capacity and the audiovisual experience and unique lighting...

Navegación de entradas

Volver a portada
1 … 3 4
  • Telefónica Tech

Popular

Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration