Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The 10 best blogposts of 2017 Safer and controlled waters with smart buoys
  • Big Data
    • The evolution of TV – Addressable Advertising: Creating a Better, More Personal TV & Video Experience 4 Data Enthusiasts changing the world as we know it
  • Cybersecurity
    • Facebook changes the logic of their TLS policy (partly due to our research), by implementing a ‘two-way’ HSTS Cybersecurity Weekly Briefing September 5-11

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Beatriz Sanz Baños

IoT: our elders best ally

There is a widespread belief that technological advances are led by and for the new generations and that our elders are a bit “out of the game” in this...
AI of Things

How Drones are making use of Artificial Intelligence

By now, you have heard, seen and possibly even own a drone yourself. You have probably seen them in countless films and TV series, and at concerts and outdoor events....
Beatriz Sanz Baños

Energy efficiency switches to the Smart side

Companies are submerged in a process of digital transformation that covers each and every one of their departments, which modifies their business strategy and reaches up to their energy management office. This...
Richard Benjamins

AI, Data and IT – how do they live together?

Many things related to AI and Data are about information technology (IT).  Systems, platforms, development, operations, security, all are needed for creating value with AI and Data, and are...
ElevenPaths

Rock appround the clock, our research in DEFCON

In the world of Threat Intelligence, determining the attacker’s geographical location of is one of the most valuable data for attribution techniques, even if not perceived like that, this...
Beatriz Sanz Baños

Safer and controlled waters with smart buoys

Internet of Things is not limited to dry land. We already saw how they it inserted itself in the sea to improve the experience of bathers and ensure more...
Beatriz Sanz Baños

The next big battle for energy efficiency … air conditioners

“The growing demand for energy from air conditioners (ACs) is one of the critical points in the debate about energy and sustainability. It is necessary to reduce their energy...
AI of Things

The evolution of TV – Addressable Advertising: Creating a Better, More Personal TV & Video Experience

Written by Natalia Barrera Palomero – Digital Consultant in LUCA Advertising As a powerful channel with broad reach, it is no surprise that TV currently accounts for $70 billion in...
Beatriz Sanz Baños

The horizon of IoT

Energy savings and production costs, the large amount of connected devices, investment in this technology or the reduction of traffic accidents is just some of the data that shows...
Beatriz Sanz Baños

10 sensors to create Smart Beaches

From the showers that clean our feet to sensors that measure the quality of the sand or sea water. The smart beaches are the next horizon, but they’re already...

Navegación de entradas

Previous articles
1 … 87 88 89 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration