Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A digital twin to save the Mar Menor Your children’s toys are now connected
  • Big Data
    • A data-driven football season The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)
  • Cybersecurity
    • #CyberSecurityPulse: Private enterprise’s sad contribution to sharing threat intelligence in the United States Cyber Security Weekly Briefing, 11 – 17 February

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

A story about two minds: the vast difference between real and perceived risk

“In our society it is generally not considered justifiable to make a decision purely on an emotional response. We want to be considered scientific and rational, so we come up with...
Richard Benjamins

Artificial Intelligence – Five Fears Explained

While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
AI of Things

AI Powering the IVF Revolution

Get ready, an IVF revolution is on the way. Scientists have discovered that an Artificial Intelligence machine, when shown images of hundreds of embryos, can predict which will result in live birth...
AI of Things

Human Intelligence driving AI: Demand for Data Scientists

Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Paloma Recuero de los Santos

Artificial Intelligence: a “very human” technology

What makes us human? The answer to this question is not simple, it’s not easy to define what makes us human.We can try to find the answer from a...
Richard Benjamins

How to fund your data journey

As of 2018, most large multinationals have started their journey to become a more data-driven organization, usually as part of their digital transformation. For most of them, it is...
AI of Things

Successful digital campaigns with Smart Insights

Post written by Carlos Vayas, Business Manager Big Data & Advertising The key to executing a successful digital campaign is having the appropriate data at the time of decision making...
AI of Things

Healthy Cities: a new paradigm to humanize smart technology

According to recent studies, urban dwellers are less able to regulate fear, anxiety or stress than residents in peripheral or rural areas. Issues such as rises in rent, perceived...
AI of Things

How the fashion industry is applying Big Data and AI

Season after season, retailers come up with loads of new products ready to hit shelves worldwide. While at one time, designers had no idea what their customers would like...
Richard Benjamins

How to select AI and Big Data use cases?

Many organizations that start working with Big Data and Artificial Intelligence (AI) ask themselves the question: where to start? In general, there are two ways to start: 1) start...

Navegación de entradas

Previous articles
1 … 74 75 76 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration