Beatriz Sanz Baños The heart of the airports pumps with IoT The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
Fernando García Gómez Waste collection vehicles join the RevolutIOTn What’s the impact of technology in our lives? Undoubtely, it makes our daily life easier both in the personal and profesional field, allowing us to obtain more benefits with less...
Beatriz Sanz Baños New Business Opportunities with IoT IoT combines virtual and real worlds for smart devices to generate a wealth of information, such that objects can act without human intervention. One way or another, the development of...
Beatriz Sanz Baños IoT to improve your Tourist Experience Would you like to enjoy a more personalized and efficient experience during your vacation? The arrival of IoT is already a real revolution in the tourism sector where this...
Luis Simón Gómez Semeleder Drones in Precision Farming Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños Click & Go, the multipurpose button What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños Connected Health, or IoT as your best lifeline IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños What is the difference between M2M and IoT? Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...