Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Who says your pet can not become an influencer? Artificial Intelligence 2022: myths and realities
  • Big Data
    • ProTrain Project: Big Data to optimise regional traffic in Germany How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm
  • Cybersecurity
    • Towards a green digital transformation Expanding Neto capabilities: how to develop new analysis plugins

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

AI of Things

How Germany moves

Our colleagues in Telefonica NEXT have created, using mobility data, data analysis and big data, an interactive map that lets you visualize nationwide traffic flows. Cities, transport companies and...
ElevenPaths

#CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business

The new year has started with a story that has taken the covers of specialized and generalist media all around the world. The vulnerabilities named as Meltdown and Spectre...
AI of Things

Dining with Data

Eating out at your favourite restaurant, discovering a hidden gem or even trying out a new recipe at home are some of the best ways to spend time. Some...
Mirian Martinez Varas

The 10 best blogposts of 2017

The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to  survey the best articles published during...
AI of Things

7 Big Data and AI predictions for 2018

2017 was, for the most part, an extremely successful year in terms of technological advancement. The IoT era kick started, Artificial Intelligence and Machine Learning gained public interest and...
AI of Things

Understanding clients of La Vaguada shopping center

Understanding the profile of clients, and their wants and needs, is vital for any brand. Companies that know what their target audience wants will be able to reach their...
AI of Things

5 Top Posts from LUCA Data Speaks Blog 2017

2017 has been a great year in many ways, in particular from a technological point of view. We have experienced an infinite number of advancements in the field and...
ElevenPaths

Come to Create Technology at Telefónica’s Chief Data Office Unit

Hi Hacker! Technology is in a constant evolution and so are we. Therefore, from Telefónica, throughout the Chief Data Office (CDO) led by Chema Alonso, which includes Aura -Cognitive Intelligence-, ElevenPaths -Cybersecurity-, LUCA -Big Data-...
Cascajo Sastre María

The Future of Connected Vehicles and IoT

Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
AI of Things

Happy holidays with data!

It’s the most wonderful time of the year, Christmas is celebrated on December 25th in homes all over the world. That means, millions and millions of turkeys cooked, presents...

Navegación de entradas

Previous articles
1 … 99 100 101 … 123
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration