Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What’s the role of satellite connectivity in an IoT world? Madrid is IoT
  • Big Data
    • Artificial Intelligence of Things, how things plan to make our lives simpler Most read content in 2021
  • Cybersecurity
    • Cybersecurity and Pandemic (II) ElevenPaths further strengthens its reputation as a cybersecurity services provider

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Machine Learning identifying rare genetic disorders

Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces?  The quantity of genetic illnesses is so...
AI of Things

Artificial Intelligence converts thoughts into speech

Neuroscientists at Columbia University have discovered a ground-breaking way of turning thoughts into speech, that could potentially give individuals who have lost their ability to speak a voice. Professor Mesgarani...
Paloma Recuero de los Santos

Python for all (4): Data loading, explorative analysis and visualisation

Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
AI of Things

Artificial Intelligence Fighting Fraud and False Declines

Through the use of Decision Intelligence and Artificial Intelligence Express platforms, Mastercard have harnessed the power of predictive analytics and machine learning to reduce the rate of false decline...
Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
The hugest collection of usernames and passwords has been filtered…or not (II)
ElevenPaths

The hugest collection of usernames and passwords has been filtered…or not (II)

Over the last entry we focused on analyzing the content of these files from a critical point of view, this is: on clarifying that when a massive leak freeing...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Paloma Recuero de los Santos

Python for all (2): What are Jupyter Notebooks?

What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Gonzalo Álvarez Marañón

Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
Carlos Alberto Lorenzo Sandoval

Towards the Fourth Industrial Revolution

The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...

Navegación de entradas

Previous articles
1 … 69 70 71 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration