Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Safer and controlled waters with smart buoys Firefighting drones
  • Big Data
    • Artificial Intelligence is disrupting the law as we know it Artificial Intelligence for warfare or for maintaining peace
  • Cybersecurity
    • Post-Quantum Future Is Around the Corner and We Are Still Not Prepared Cyber Security Weekly Briefing, 9 — 15 July

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’
ElevenPaths

Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’

In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for one detail: their lack of...
Olivia Brookhouse

Would you let Artificial Intelligence run Christmas?

Artificial Intelligence and Big Data are transforming the workplace, providing real time insights to optimize decision making. Meanwhile at home, AI embedded home devices and online applications can accurately...
AI of Things

Success Story: LUCA Transit and Highways England

The transport industry is very receptive to the application of Big Data and Artificial Intelligence strategies, as there are clear use cases that can maximize a companies’ efficiency and...
AI of Things

Success Story: Using Big Data to improve Tourism with Iberostar

In today’s data story, we talk about some of the main applications of Big Data and Artificial Intelligence within the tourism sector. In this case, the hotel chain, Iberostar,...
AI of Things

Artificial Intelligence in the Industrial Sector: the success story of Repsol

Although technological advances have been left behind in recent years, the industrial sector presents opportunities for developpment in the field of Big Data and Artificial Intelligence, and also in...
Olivia Brookhouse

The Big Data behind Black Friday

It is often the products that seem to have “come out of nowhere” that suddenly experience rocket sales and have everyone talking. Whether its health fads such as...
Rocío Muñoz Paul

How Telefonica has implemented the first automatized SDN network

Much research and case studies have been put into the latest technologies as applied to telecommunications networks for automation and operational efficiency purposes aimed at the needs of future 5G networks and...
New App to Clean Metadata More Easily
Sergio de los Santos

New App to Clean Metadata More Easily

We are not going to repeat the dangers of metadata, since it has been discussed for quite some time now. However, we can try to make its management and cleaning simpler. Some...
AI of Things

SMASSA Success Story: Intelligent Parking Services

Today we bring another success story from the public sector: the example of SMASSA, the Sociedad Municipal de Aparcamientos (Municipal Parking Company) whose mission is to solve the parking...
Olivia Brookhouse

Big Data, the fuel for Digital Banks

In 1981, Bill Gates said “640KB will be enough for anybody”. Surpisingly, it was hard even then, to imagine where we would be today; in a sea of data....

Navegación de entradas

Previous articles
1 … 60 61 62 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration