Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT, the new ally of renewable energies? Barriers to IoT adoption
  • Big Data
    • Creating smarter fire services using data science What are the 5 principles of joined-up data?
  • Cybersecurity
    • WhatsApp Terms and Conditions Update: A Cheeky Move? 3 Key Cyber Security Considerations

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

ElevenPaths

DNS over HTTPS (DoH) is already here: the controversy is served

Recently, the IETF has raised to RFC the DNS over HTTPS proposal. In other words, this means resolving domains through the well-known HTTPS, with its corresponding POST, GET and certifications...
Santiago Morante Cendrero

Warning About Normalizing Data

For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
Cascajo Sastre María

IoT growth forecast

Internet of Things is transforming the world of technology by leaps and bounds. Its evolution enables the development of smart cities, industries and homes, which generates more sustainable and...
AI of Things

Big Data & AI changing the music game: IBM Watson BEAT

Music is something that unites us. Go anywhere in the world and you will find music: someone singing, playing, rapping or dancing. For thousands of years it has formed...
Beatriz Sanz Baños

7 objects that you did not know are IoT

Internet of Things, Big Data and Artificial Intelligence keep expanding to all areas of our lives, improving the productivity of companies, governments and people. The amount of everyday objects integrate...
Cascajo Sastre María

IoT and Big Data: the parents of carsharing

Mobility is one of the main problems of large cities. Every day, millions of citizens are caught in traffic jams. Although it may seem difficult, this reality can be...
AI of Things

Expert Systems in the World of Medicine

Written  by Sergio Sancho Azcoitia, Security Research en ElevenPaths  Since its appearance a few years ago, expert systems have been applied in different fields. Due to their effectiveness they have...
ElevenPaths

A story about two minds: the vast difference between real and perceived risk

“In our society it is generally not considered justifiable to make a decision purely on an emotional response. We want to be considered scientific and rational, so we come up with...
Richard Benjamins

Artificial Intelligence – Five Fears Explained

While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
Mirian Martinez Varas

IoT Solutions World Congress

More than 40,000 million devices connected in 2023. This is the data, according to a report by Business Insider, under which the IoT Solutions World Congress was held at the Fira de...

Navegación de entradas

Previous articles
1 … 84 85 86 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration