Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project The connected football stadiums
  • Big Data
    • What to expect from Artificial Intelligence in 2020? Poverty Insights in Guatemala using Big Data
  • Cybersecurity
    • Adversarial Attacks: The Enemy of Artificial Intelligence Cyber Security Weekly Briefing 12-18 March

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

AI of Things

Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs

Normal 0 false false false EN-US ZH-CN AR-SA /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; ...
AI of Things

Entrevista: Angela Shen-Hsieh desmitifica“la caja negra” del Big Data

Angela Shen-Hsieh es Directora de Predicción del Comportamiento Humano en la Innovación de Productos de Telefónica. En esta función, se encarga de liderar la innovación interna. Antes de unirse a...
AI of Things

The new Spain: redrawing the country using mobility data

One of the most exciting fields that the use of data opens up is the study of networks. Our societies, communications, infrastructure, businesses and many other areas of life...
Figure 1: The Royal Palace is one of Madrid's top tourist attractions.
AI of Things

Case Study: LUCA Tourism and Royal Palace Visitors Analysis

Madrid receives almost 6 million international tourists annually, who come to the city to see the history, soak up the sunshine and experience the culture. In addition to this...
ElevenPaths

The Intelligent MSSP

During years, Managed Security Services (MSS) have been the most effective strategy to tackle the increasing and changing threat landscape. Otherwise, some disruptive factors are compelling a new approach...
Figure 1: DK Management have decided to use LUCA Store.
AI of Things

Case Study: LUCA Store and DK Management, driving footfall and increasing convertion

In case you didn’t already know one of the many products from our business portfolio is LUCA Store. This post will take a look at our collaboration with DK...
ElevenPaths

ElevenPaths and BitSight deliver enhanced visibility into supply chain risk with continuous monitoring

Security Ratings Market Leader Expands Global Reach with New Strategic Alliance CAMBRIDGE, MA—June 13, 2017. ElevenPaths, Telefónica Cibersecurity Unit specialized in the development of innovative security solution, and BitSight, the Standard...
AI of Things

What does it take to become a top class Smart City?

The term Smart City is a term that has been coined in recent years following the surge in use of Big Data. At LUCA we have been contributing to...
AI of Things

Data rewards are the new consumer engagement tool & Gigabytes are the new currency

Today’s consumers are fairly savvy about companies selling to them. As they are constantly bombarded with an increasing number of calls to action, these engagement attempts are often viewed...
AI of Things

Machine Learning to analyze League of Legends

Written by David Heras and Paula Montero, LUCA Interns, and Javier Carro Data Scientist at LUCA When League of Legends was released in 2009, few people could have predicted what...

Navegación de entradas

Previous articles
1 … 107 108 109 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration