Olivia Brookhouse What is IoT: Solutions and future applications Are you interested in finding out what is the Internet of Things (IoT)? It is an ever-growing technology which opens doors to new opportunities in multiple sectors ranging from...
Beatriz Sanz Baños Your children’s toys are now connected Smartwatches, drones, lights controlled from our mobile or connected scooters are already a reality in our everyday life. Connectivity and data storage have been gradually taking over the consumer...
Beatriz Sanz Baños New Business Opportunities with IoT IoT combines virtual and real worlds for smart devices to generate a wealth of information, such that objects can act without human intervention. One way or another, the development of...
Beatriz Sanz Baños The 6 key conclusions of the user experience of Internet of Things in Spain According to the study Things Matter 2019 the connected car is one of the engines of the IoT 87% of those who use IoT declare that they wouldn’t give up...
Luis Simón Gómez Semeleder Drones in Precision Farming Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños Click & Go, the multipurpose button What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños Connected Health, or IoT as your best lifeline IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...