Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Waste Management in a Smart City – The Smart Bin 5 AI uses in Photography
  • Big Data
    • Enrich your messages with the new SMS 2.0 4 reasons why you should visit the LUCA stand at MWC2017
  • Cybersecurity
    • Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection #CyberSecurityPulse: Google’s project to fight election attacks

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part II)

Written by Enrique Blanco (CDO Researcher) and Fran Ramírez (Security Researcher at Eleven Paths) In this article, the second about our experiment using Reinforcement Learning (RL) and Deep Learning in...
AI of Things

Business Messaging – From humble SMS to conversational commerce

Written by Jenny Whelan, Head of Business Affairs – LUCA Advertising We all know SMS. With 5 billion users, the reach of SMS as a messaging channel is unparalleled. Combined...
ElevenPaths

ElevenPaths Announces Strategic Security Alliance with Devo

Provides Telefónica Customers Advanced Cybersecurity Monitoring and Protection Services Through Devo Data Operations Platform. Madrid- Thursday 14th of June, 2018. ElevenPaths, the Telefónica Cybersecurity Unit, specialized in development of innovative...
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern AI can achieve the impressive performance in perception & recognition tasks mentioned in...
ElevenPaths

#CyberSecurityPulse: Changing stereotypes in the security sector

Ripples of outrage spread across the cybersecurity industry last week after women in red evening gowns were seen promoting a product at the Infosecurity Europe 2018 conference. The event’s...
AI of Things

Big Data Analytics, but what type?

In today’s climate, businesses are already aware that if they don’t make the most of their data, they will be left behind by the competition. They know that traditional...
AI of Things

Deep Learning vs Atari: train your AI to dominate classic videogames (Part I)

A few months ago we began a series of posts on this blog where we explained how you can train an Artificial Intelligence (AI) to eventually win certain games....
AI of Things

The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part I)

Guest Post written by Paulo Villegas – Head of Cognitive Computing at AURA in Telefónica CDO Modern Artificial Intelligence is performing human-like tasks that seemed out of reach just a...
ElevenPaths

New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere

You all know Metashield. Basically, it is a technology from our own to analyze and clean metadata, that is used in several of our own products. Although metadata seems...
Richard Benjamins

Will GDPR’s “right to data portability” change the data industry forever?

After years of preparation, on May 25 2018, the new General Data Protection Regulation (GDPR) has come into force.  Much has been written, discussed and speculated about it. Over...

Navegación de entradas

Previous articles
1 … 77 78 79 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration