Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is the difference between M2M and IoT? What is IoT: Solutions and future applications
  • Big Data
    • How can we bring Internet of Things to the rural world? Big Data Analytics, but what type?
  • Cybersecurity
    • Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations Cyber Security Weekly Briefing, 10 – 16 December

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Ana Zamora

Big Data and Tourism: How this Girona Festival became Data-Driven

Every year, from the 9th to the 17th of May, Girona celebrates the “Temps de Flors”,  one of the most popular flower festivals in Europe. For ten days, the...
Florence Broderick

You can still win 5000 dollars. Send your Latch plugins over!

Remember that on Monday, December 12 at 1pm (CET), the deadline for the submission of applications for our Latch plugins competition ends. You’ve had almost two months to think...
AI of Things

International call traffic may tell you more than first thought

This post debates the value of international phone calls in understanding society. Telefónica has a wide global infrastructure of networks which can be used by other service providers to carry...
Richard Benjamins

Artificial Intelligence: What even is that?

Artificial Intelligence (AI) is the hottest topic out there at the moment, and often it is merely associated with chatbots such as Siri or other cognitive programs such as...
Florence Broderick

Telefónica Mannequin Challenge

Today in the office we decided to do our very own Mannequin Challenge, bringing together employees from all over Telefónica. This viral internet craze has even frozen the internet...
AI of Things

Can Mobile Data combat Climate Change in Germany?

One of our favourite topics here at LUCA is using Big Data for Social Good, to measure our progress on Sustainable Development Goals. Three of the 17 goals are...
Florence Broderick

Take part in Latch Plugins Contest with such hacks as Paper Key. Are you game?

At Elevenpaths there is a tradition of developing innovation and training the ability to transform an idea into something tangible, as you might know that in development process, projects...
AI of Things

Commuter Traffic: Can Big Data solve the problem?

When we sit in our daily traffic jams, many of us may think: Where do the other commuters come from? Where are they on their way to? Are we...
Florence Broderick

Big Dating: Could AI be the real matchmaker on Tinder?

Online dating platforms such as Tinder, Happn and Hinge are seeing exponential growth, slowly sliding on to the home screens of smartphone users all over the world.  Last week...
Florence Broderick

ElevenPaths and Etisalat Digital announce their collaboration for Mobile Security R&D

Madrid, November 21 2016.– ElevenPaths, Telefónica Cyber Security Unit, and Etisalat Digital, two of the world’s leading providers of communications services and solutions, announced today their collaboration in the...

Navegación de entradas

Previous articles
1 … 104 105 106 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration