Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The impacts and benefits of telemetry in Industrial m2m processes MWC21: 5G and digital technologies, a reality for the post-covid recovery
  • Big Data
    • Python for all (5): Finishing your first Machine Learning experiment with Python Rebuilding Mocoa with Big Data
  • Cybersecurity
    • The Work of a Cyber Intelligence Unit in The Context Of Incident Response The Data Transparency Lab strengthens its work on data transparency after investing over one million euros in three years

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Olivia Brookhouse

Going to the bar with Artifical Intelligence

The average adult spends 2 months of their life queuing at bars and pubs for drinks and at Christmas these queues can seem even longer. Whilst some of us...
Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’
ElevenPaths

Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’

In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for one detail: their lack of...
Olivia Brookhouse

Would you let Artificial Intelligence run Christmas?

Artificial Intelligence and Big Data are transforming the workplace, providing real time insights to optimize decision making. Meanwhile at home, AI embedded home devices and online applications can accurately...
Beatriz Sanz Baños

The trip experience starts at the airport

Madrid, December 6, 2019, 11:00 a.m. César starts his vacation today. He is very excited because it will be the first time he travels to Asia. He begins an exciting...
Sarah Rojewski

Transformation of customer service and sales in Germany with Aura

I was invited to the event “Women in AI & Data” organized by databricks and hosted by Microsoft in Munich. It seems like a trendy topic but the founder...
AI of Things

Success Story: LUCA Transit and Highways England

The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
AI of Things

Success Story: Using Big Data to improve Tourism with Iberostar

In today’s data story, we talk about some of the main applications of Big Data and Artificial Intelligence within the tourism sector. In this case, the hotel chain, Iberostar,...
AI of Things

Artificial Intelligence in the Industrial Sector: the success story of Repsol

Although technological advances have been left behind in recent years, the industrial sector presents opportunities for developpment in the field of Big Data and Artificial Intelligence, and also in...
Olivia Brookhouse

The Big Data behind Black Friday

It is often the products that seem to have “come out of nowhere” that suddenly experience rocket sales and have everyone talking. Whether its health fads such as...
Beatriz Sanz Baños

The Smart mining revolution

The integration of IoT in smart mining manages to connect its employees with their work environment, providing different benefits that reduce the percentage of accidents. Since its inception, safety has...

Navegación de entradas

Previous articles
1 … 65 66 67 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration