Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Hologram Concert – How AI is helping to keep music alive Your assets controlled with a click: Things Ready Link
  • Big Data
    • Reducing travel delays using Big Data Expert Systems in the World of Medicine
  • Cybersecurity
    • #CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer OpenPGP: Desperately Seeking Kristian

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Stefan Leadbeater

How Big Data & Artificial Intelligence are having a positive impact in the sport of Rugby Union

The use of big data and data analytics is not something which has only just become apparent in sport, in fact it has been around for a long time....
#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses

Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
Fernando Menéndez-Ros

The expansion and future of Aura, Telefónica’s AI

A few years ago, Telefónica began a digital transformation process with the aim of seeking simplification, adaptation and the comprehensive digitalisation of the Company through the design and implementation...
Richard Benjamins

Artificial Intelligence for warfare or for maintaining peace

On July 3, 2019, I attended an event organized by the Spanish Center for National Defense Studies (CESEDEN) and the Polytechnic University of Madrid (UPM) on the impact of AI...
A government is known by the Apple data it requests
Sergio de los Santos

A government is known by the Apple data it requests

Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Sergio de los Santos

The attack against OpenPGP infrastructure: consequences of a SOB’s actions

What is happening with the attack against OpenPGP infrastructure constitutes a disaster, according to the affected people who maintain the protocol. Robert J. Hansen, who communicated the incident, has...
Facebook Libra coin blockchain
Alfonso de la Rocha Gómez-Arevalillo

The truth behind Libra, Facebook’s new cryptocurrency

It’s been almost a week since Facebook’s public release of Libra Blockchain, a decentralized programmable database promoted by Facebook to support a low-volatility cryptocurrency. Opiniated rivers of ink have...
Antonio Pita Lozano

The data-driven transformation of businesses, a matter of survival

Written by Antonio Pita During the Digital Enterprise Show (#TelefónicaEmpresasDES) celebrated in Madrid at the end of last month we had the opportunity to look at the state-of-the-art disciplines which surround the...
Anshul Kudal

How do you capture clients on multiple channels?

Have you heard of the word omnichannel? It is a word which is used a lot in the world of marketing. Like its name indicates, it refers to multiple...
Cristina de la Cruz

Hacker Women are driving Aura, Telefónica’s Artificial Intelligence

Telefónica is the pioneer telco in introducing Artificial Intelligence (AI), through Aura, to facilitate communication with its customers. Behind this initiative, one of the Company’s most ambitious, the profiles...

Navegación de entradas

Previous articles
1 … 64 65 66 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration