Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT in Hotels Quantum computing in the future of IoT
  • Big Data
    • GDPR 101: What you need to know Macro data, macro responsibility
  • Cybersecurity
    • FaceApp and Personal Data, Hadn´t We Talked About This Already? GSMA IoT Security Champion: Award to our IoT Security team

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

The refugee crisis and Syrian Civil War; a humanitarian issue reflected through data

When we finish the year we always look to the past to weigh up the good and the bad moments of the year (trying to make the most of...
Richard Benjamins

Can machines think? Or are humans machines?

This is the last in a series of three post about some fundamental notions of AI. The objective of these series of three posts is to equip readers with...
AI of Things

Where are people from Madrid going during the upcoming December holidays?

During the early December bank holiday many of us take the opportunity to relax, discover new places or return to our countries of origin. This time, as a further...
Florence Broderick

ElevenPaths discovers the Popcorn ransomware passwords: no need to infect other people to decrypt for free

MalwareHunterTeam has discovered a new variant of ransomware that is quite curious. At ElevenPaths we have been able to download and analyze the new improved versions that make several...
AI of Things

Marathon Commuters: Which nationalities spend most time travelling to and from work?

Just 600 cities are projected to create more than 60% of global economic growth by 2025.  Our reluctance to distribute population outside of these urban powerhouses has caused city...
Richard Benjamins

How “intelligent” can Artificial Intelligence get?

This post is the second in a series of three posts, each of which discuss the fundamental concepts of Artificial Intelligence. In our first post we discussed AI definitions,...
AI of Things

Air Quality: How can Open Data and Mobile Data provide actionable insights?

  Today on our blog we’ve decided to take the mobility and traffic Big Data  analysis we started here a little bit further, looking at the relationship between commuting and air...
Florence Broderick

Latch Plugins Contest 2016 is over

Today, Monday, December 12 at 1 pm (CET), was the deadline for the submission of plugin applications to the Latch Plugins Contest, the Latch contest that looks for innovative...
Ana Zamora

#LanzamosLUCA: Dave Sweeney on using Mobile Data to disrupt Transport and Tourism

This week we share the launch presentation of Dave Sweeney, our Commercial Lead for Public and Transport sectors in the UK.  Dave told us all about about how mobile...
AI of Things

The 5 most in-demand Big Data profiles in 2017

With Big Data falling off the Gartner Emerging Technology Hype Cycle this year, and Artificial Intelligence now hogging the limelight, we decided to take a look at the most...

Navegación de entradas

Previous articles
1 … 103 104 105 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Participating in GSMA Mobile 360 LATIN AMERICA
Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration