Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Trends for 2017, users in the spotlight Safer, but not immune
  • Big Data
    • Success Story: LUCA Transit and Highways England Data rewards are the new consumer engagement tool & Gigabytes are the new currency
  • Cybersecurity
    • Trend Report: Hacktivist CyberThreats Report 2019 A story about two minds: the vast difference between real and perceived risk

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Analysing tourist profiles in Spain with INE

Tourism is one of the main sectors of economic activity in Spain. According to the National Institute of Statistics (INE), an autonomous body under the Ministry of Economy in...
AI of Things

5 in 5: How AI can benefit your business (EP 1)

Over the last 10 years, we have experienced a monumental shift in the way in which businesses operate. Terms such as Big Data and Artificial Intelligence are common place, and as the full...
AI of Things

Mobility patterns in Lima and Callao based on Big Data technology

We often think of Big Data as something exclusive to private companies. But one of the clearest applications is that of public bodies who want to improve the lives...
ElevenPaths

You are less rational than you think when you take decisions under uncertain conditions

I propose you the following game of luck:   Option A: I give 1,000 € to you with a probability of 100%. Option B: Let’s leave it to heads or tails: if...
AI of Things

4 trends in technology for 2019

Now that the year is almost coming to a close, it’s worth it to take a look at the predictions made for next year. What are the trends on...
AI of Things

A Brief History of Machine Learning

As members of the Machine Learning community, it would be a good idea for us all to have an idea of the history of the sector we work in....
ElevenPaths

DNS over HTTPS (DoH) is already here: the controversy is served

Recently, the IETF has raised to RFC the DNS over HTTPS proposal. In other words, this means resolving domains through the well-known HTTPS, with its corresponding POST, GET and certifications...
Santiago Morante Cendrero

Warning About Normalizing Data

For many machine learning algorithms, normalizing data for analysis is a must. A supervised example would be neural networks. It is known that normalizing the data being input to...
AI of Things

Big Data & AI changing the music game: IBM Watson BEAT

Music is something that unites us. Go anywhere in the world and you will find music: someone singing, playing, rapping or dancing. For thousands of years it has formed...
AI of Things

Expert Systems in the World of Medicine

Written  by Sergio Sancho Azcoitia, Security Research en ElevenPaths  Since its appearance a few years ago, expert systems have been applied in different fields. Due to their effectiveness they have...

Navegación de entradas

Previous articles
1 … 73 74 75 … 120
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration