Beatriz Sanz Baños Discover the Connected Pool Did you know that in Spain there are around 1,200,000 swimming pools dedicated to leisure and sport? That means 1 pool for every 39 people! Spain is the country...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Beatriz Sanz Baños IoT for a better world The Sustainable Development Goals (SDGs) are a United Nations-led initiative to address the most important problems our society faces. It encompasses “a set of interconnected social, economic and environmental...
Beatriz Sanz Baños IoT to improve your Tourist Experience Would you like to enjoy a more personalized and efficient experience during your vacation? The arrival of IoT is already a real revolution in the tourism sector where this...
Luis Simón Gómez Semeleder Drones in Precision Farming Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños Click & Go, the multipurpose button What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños Connected Health, or IoT as your best lifeline IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...