AI of Things Business Message main players and roles Telecommunications companies have a natural right to play in enabling communication channels for their customers. However, in the case of P2P (Peer to Peer) messaging we see that Over...
Richard Benjamins London AI Summit 2019 The London AI Summit attracted thousands of visitors; so many more than when AI was still a niche thing in the 90-ies. As always with such big events, it was a...
Luis Simón Gómez Semeleder IoT is on your head There are many Jobs in which protecting your head is vital to avoid serious accidents, but can you imagine being protected beyond the blows that a helmet prevents? And...
Antonio Guzmán Home as a Computer, a new prospect for connected homes Telefónica is the leading telecommunications company in terms of innovation and a forerunner in introducing the latest Artificial Intelligence technology to people’s daily lives. This is why we have...
Chema Alonso The birth of Aura and its presentation in Microsoft When I became Chief Data Officer at Telefónica, I was faced with new challenges and possibilities as I began carrying out this new role in the company. One of...
Óscar Mancebo Movistar Home, the reinvention of the home thanks to Artificial Intelligence At the 2018 edition of MWC, we announced that we were working on Movistar Home, a device aimed at reinventing the home incorporating Aura, Telefónica’s artificial intelligence, for its...
Beatriz Sanz Baños The Champions is also IoT IoT technology makes the Wanda Metropolitano football stadium one of the most advanced in the world, thanks to its great connectivity capacity and the audiovisual experience and unique lighting...
Alfonso Ibañez Semi-Supervised Learning… the great unknown In recent years much progress has been made in solving complex problems thanks to Artificial Intelligence algorithms. These algorithms need a large volume of information to discover and learn, continuously, hidden patterns in the...
Cristina de la Cruz Do Virtual Assistants improve the user experience with telcos? Virtual Assistants are more and more relevant in people’s daily lives, especially when it comes to requesting traffic information, reminders, weather reports… However, when it comes to interacting with...
ElevenPaths Your feelings influence your perception of risk and benefit more than you might think Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in...
Innovation Marketing Team Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...