Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The next big battle for energy efficiency … air conditioners A digital twin to save the Mar Menor
  • Big Data
    • The Deep Learning Hype Open Algorithms, what are they? Yves-Alexandre de Montjoye explains
  • Cybersecurity
    • Winner of the #EquinoxRoom111 Contest m33tfinder: a vulnerability on Cisco Meeting Server detected by ElevenPaths

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Beatriz Sanz Baños

Kevin Ashton just asks companies to use the IoT

Acknowledged as the creator of the expression “Internet of Things” and precursor of a global standard system for Radio Frequency Identification (RFID), Kevin Ashton chatted with m2m Telefónica about the current...
María Cascajo Sastre

10 features that the city of the (near) future will have

The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños

What is the difference between M2M and IoT?

Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...

Navegación de entradas

Volver a portada
1 … 122 123
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
ElevenPaths with triple representation at the eCrime 2015 conference
This year, the antiphishing working group organizes the eCrime 2015 conference in Barcelona from May 26 to 29. This symposium on eCrime investigation is attended by professionals who have...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration