Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Debate about the future of the Connected Industry 4.0 Fashion connected: the IoT revolution in the textile sector
  • Big Data
    • LUCA boosts brand engagement with “Sponsored Data” product What is Natural Language Processing and its Use Cases?
  • Cybersecurity
    • Frequently Asked Questions About Printnightmare (CVE-2021-34527) Do I Really Need an Antivirus?

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

What does it take to become a top class Smart City?

The term Smart City is a term that has been coined in recent years following the surge in use of Big Data. At LUCA we have been contributing to...
AI of Things

Data rewards are the new consumer engagement tool & Gigabytes are the new currency

Today’s consumers are fairly savvy about companies selling to them. As they are constantly bombarded with an increasing number of calls to action, these engagement attempts are often viewed...
ElevenPaths

ElevenPaths announces that its security platform complies with the new european data protection regulation one year earlier than required

The European regulations will enter into force in May 2018, when entities that do not comply can be penalized with fines of up to 4% of their annual turnover.  ElevenPaths...
AI of Things

Machine Learning to analyze League of Legends

Written by David Heras and Paula Montero, LUCA Interns, and Javier Carro Data Scientist at LUCA When League of Legends was released in 2009, few people could have predicted what...
AI of Things

A World-Changing Combination: Dr. Claire Melamed on Big Data, Collaboration and the SDGs

Dr. Claire Melamed is the Executive Director of Global Partnership for Sustainable Development Data (GPSDD), where she leads efforts to collaborate on leveraging data to meet the UN’s Sustainable...
AI of Things

BD4SG: A new way to understand Big Data

Recent years have seen a large public debate surrounding the technology behind Big Data and how it can help optimise organizations, maximise profits and bring companies closer to their...
AI of Things

Responsible data usage for effective advertising

Written by Liao Yin Tung  Recently The Economist stated that “The world’s most valuable resource is no longer oil, but data”. With the rise of mobile technology, traditional advertising has unsurprisingly...
ElevenPaths

Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?

When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
AI of Things

LUCA chooses Hortonworks from Hadoop as its platform to offer Big Data as a service for Spain

As each business sector is becoming increasingly competitive, data has become a key asset to success. In order to best leverage this asset, though, businesses need to ensure that...
AI of Things

LUCA Talk 5: Transforming the Tourism Industry with Dynamic Insights

It is already common knowledge that tourism is one of the biggest successes for the Spanish economy. Travelers are now more informed than ever before, instantly sharing their experiences...

Navegación de entradas

Previous articles
1 … 93 94 95 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration