Beatriz Sanz Baños Fleet Optimize for Field Force Smart driving has become a priority for users and companies that want to go further. Can you imagine increasing the profitability and safety of your fleet of vehicles by...
Beatriz Sanz Baños Your city is more accessible with IoT According to the latest data from the National Statistics Institutethere are 3.84 million people with some type of disability in Spain. A figure to bear in mind since it makes...
Beatriz Sanz Baños Efficient and responsible milk production We have a new example of how technology can help us form a better society in which the production and consumption of milk is carried out in a sustainable...
Beatriz Sanz Baños Smart gas stations and how to find them In the last few years, gas stations started to offer travelers a wide range of possibilities beyond mere refueling. This increases competition between service stations, which is forcing these...
Luis Simón Gómez Semeleder Drones in Precision Farming Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños Click & Go, the multipurpose button What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños Connected Health, or IoT as your best lifeline IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...