Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Robot Waiters – The future or just a gimmick? Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)
  • Big Data
    • Smart Cities: Pushing Open Data with Power BI What role will Data Governance play in the Digital Transformation after COVID-19?
  • Cybersecurity
    • Cybersecurity Weekly Briefing July 4-10 Most Software Handling Files Overlooks SmartScreen in Windows

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
ElevenPaths

A story about two minds: the vast difference between real and perceived risk

“In our society it is generally not considered justifiable to make a decision purely on an emotional response. We want to be considered scientific and rational, so we come up with...
Richard Benjamins

Artificial Intelligence – Five Fears Explained

While there are many great applications of Artificial Intelligence, a disproportionate amount of attention is given to concerns about AI such as robots taking over control, losing our jobs, malicious...
AI of Things

AI Powering the IVF Revolution

Get ready, an IVF revolution is on the way. Scientists have discovered that an Artificial Intelligence machine, when shown images of hundreds of embryos, can predict which will result in live birth...
AI of Things

Human Intelligence driving AI: Demand for Data Scientists

Many industries today are data-driven. The amount of data, its variety, and the speed at which it is collecting means that it needs to be analysed scientifically if any...
Paloma Recuero de los Santos

Artificial Intelligence: a “very human” technology

What makes us human? The answer to this question is not simple, it’s not easy to define what makes us human.We can try to find the answer from a...
Richard Benjamins

How to fund your data journey

As of 2018, most large multinationals have started their journey to become a more data-driven organization, usually as part of their digital transformation. For most of them, it is...
AI of Things

Successful digital campaigns with Smart Insights

Post written by Carlos Vayas, Business Manager Big Data & Advertising The key to executing a successful digital campaign is having the appropriate data at the time of decision making...
AI of Things

Healthy Cities: a new paradigm to humanize smart technology

According to recent studies, urban dwellers are less able to regulate fear, anxiety or stress than residents in peripheral or rural areas. Issues such as rises in rent, perceived...
AI of Things

How the fashion industry is applying Big Data and AI

Season after season, retailers come up with loads of new products ready to hit shelves worldwide. While at one time, designers had no idea what their customers would like...
Richard Benjamins

How to select AI and Big Data use cases?

Many organizations that start working with Big Data and Artificial Intelligence (AI) ask themselves the question: where to start? In general, there are two ways to start: 1) start...

Navegación de entradas

Previous articles
1 … 74 75 76 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration