Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence: a companion to fight loneliness Have you ever wondered where the energy comes from?
  • Big Data
    • Movistar Team: the best cyclists, the best behind the scenes team, the best strategy and Big Data What role will Data Governance play in the Digital Transformation after COVID-19?
  • Cybersecurity
    • The Wannacry authors also want their Bitcoin Cash #CyberSecurityPulse: Injection and XSS, the Most Critical Web Application Security Risks

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Roberto García Esteban

Metacloud: a cloud of clouds

The digitalisation of society is rapidly advancing, mainly driven by the development of the internet and Cloud technology. Companies are rushing to adopt these new technologies in pursuit of...
Nacho Palou

Key ingredients for today’s Smart Cities

The term Smart City used to refer to “cities of the future”, but Smart Cities are increasingly turning the present. Thanks to the use of digital solutions such as...
Telefónica Tech

Cyber Security Weekly Briefing, 21 January – 3 February

LockBit Green: new LockBit variant Researchers at vx-underground have recently detected that a new ransomware variant, called LockBit Green, is being used by the LockBit ransomware handlers. This new variant...
Martiniano Mallavibarrena

Cybersecurity in films: myth vs. reality with 10 examples

The multiple aspects of cybersecurity (attacks, investigations, defence, disloyal employees, negligence, etc.) have been part of the plot of countless movies and TV series for years. In today’s society,...
Nacho Palou

Smart urban lighting: business opportunities and benefits

Smart street lighting is one of the pillars of smart cities. In fact, it is one of the best examples of what the term Smart City means: the application...
Daniel Pous Montardit

Resilience, key to Cloud-Native systems

In the first post of the Cloud-Native series, What is a Cloud-Native Application?, or what it means that my software is Cloud Native, we presented resilience as one of...
Telefónica Tech

Cyber Security Weekly Briefing, 21 – 27 January

Killnet targeting victims in Spain This week, the hacktivist group Killnet announced a campaign of attacks against Germany, leading to Distributed Denial of Service (DDoS) attacks that rendered the websites...
Marta Nieto Gómez-Elegido

«We are moving towards genderless professions», María Martínez

It’s a cold morning in Madrid and María Martínez Martín, Head of the Threats Intelligence Operations team at Telefónica Tech, welcomes us at the Telefónica building. Wearing a blue blazer...
Gonzalo Fernández Rodríguez

What is a Cloud-Native Application?

The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Nacho Palou

A concept popularized by a former Google CEO is more relevant today than ever

A few years ago, Google’s then CEO Eric Schmidt popularised the concept of “augmented humanity”. This term refers to the ability of technology to “enhance human capabilities” to make...

Navegación de entradas

Previous articles
1 … 6 7 8 … 120
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
New Tool: JavaRuleSetter for creating Devployment Rule Sets in Java
Oracle introduced the notion of whitelisting in Java 7 update 40. It was called Deployment Rule Set. In Java update 51, it introduced a new feature, that was close...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration