Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project Medical video assistance thanks to IoT
  • Big Data
    • Telefónica Activation Programme, how to scale your startup Fake News : how should we be fighting it?
  • Cybersecurity
    • 26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma Cybersecurity in films: myth vs. reality with 10 examples

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

AI of Things

Artificial Intelligence Fighting Fraud and False Declines

Through the use of Decision Intelligence and Artificial Intelligence Express platforms, Mastercard have harnessed the power of predictive analytics and machine learning to reduce the rate of false decline...
Beatriz Sanz Baños

Medical video assistance thanks to IoT

Much has been said about the arrival of Internet of Things in numerous sectors such as industry, home automation or even leisure, but little, however, of its application to...
Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
The hugest collection of usernames and passwords has been filtered…or not (II)
ElevenPaths

The hugest collection of usernames and passwords has been filtered…or not (II)

Over the last entry we focused on analyzing the content of these files from a critical point of view, this is: on clarifying that when a massive leak freeing...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Beatriz Sanz Baños

Bed time will never be the same

Internet of Things has proven to be very useful in improving people’s lives in areas such as health and personal rest. This technology has also been proven to help...
Salmerón Uribes Marina

“The client seeks to live a different experience with each purchase”

“The music of nougat “El Almendro” is recognized by one hundred percent of the respondents” We all take it for granted when entering a hotel, a cafeteria or a supermarket...
Paloma Recuero de los Santos

Python for all (2): What are Jupyter Notebooks?

What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Gonzalo Álvarez Marañón

Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
Carlos Alberto Lorenzo Sandoval

Towards the Fourth Industrial Revolution

The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...

Navegación de entradas

Previous articles
1 … 78 79 80 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration