Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT is on your head 5 ways the IoT is helping the Environment
  • Big Data
    • TOP 5: The 5 most read posts of Synergic Partners 5 jobs that you didn’t know used Data Science
  • Cybersecurity
    • Post-Quantum Future Is Around the Corner and We Are Still Not Prepared Tell Me What Data You Request from Apple and I Will Tell You What Kind of Government You Are

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Stefan Leadbeater

How Big Data & Artificial Intelligence are having a positive impact in the sport of Rugby Union

The use of big data and data analytics is not something which has only just become apparent in sport, in fact it has been around for a long time....
#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses

Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
Fernando Menéndez-Ros

The expansion and future of Aura, Telefónica’s AI

A few years ago, Telefónica began a digital transformation process with the aim of seeking simplification, adaptation and the comprehensive digitalisation of the Company through the design and implementation...
Richard Benjamins

Artificial Intelligence for warfare or for maintaining peace

On July 3, 2019, I attended an event organized by the Spanish Center for National Defense Studies (CESEDEN) and the Polytechnic University of Madrid (UPM) on the impact of AI...
A government is known by the Apple data it requests
Sergio de los Santos

A government is known by the Apple data it requests

Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Sergio de los Santos

The attack against OpenPGP infrastructure: consequences of a SOB’s actions

What is happening with the attack against OpenPGP infrastructure constitutes a disaster, according to the affected people who maintain the protocol. Robert J. Hansen, who communicated the incident, has...
Facebook Libra coin blockchain
Alfonso de la Rocha Gómez-Arevalillo

The truth behind Libra, Facebook’s new cryptocurrency

It’s been almost a week since Facebook’s public release of Libra Blockchain, a decentralized programmable database promoted by Facebook to support a low-volatility cryptocurrency. Opiniated rivers of ink have...
Antonio Pita Lozano

The data-driven transformation of businesses, a matter of survival

Written by Antonio Pita During the Digital Enterprise Show (#TelefónicaEmpresasDES) celebrated in Madrid at the end of last month we had the opportunity to look at the state-of-the-art disciplines which surround the...
Anshul Kudal

How do you capture clients on multiple channels?

Have you heard of the word omnichannel? It is a word which is used a lot in the world of marketing. Like its name indicates, it refers to multiple...
Cristina de la Cruz

Hacker Women are driving Aura, Telefónica’s Artificial Intelligence

Telefónica is the pioneer telco in introducing Artificial Intelligence (AI), through Aura, to facilitate communication with its customers. Behind this initiative, one of the Company’s most ambitious, the profiles...

Navegación de entradas

Previous articles
1 … 64 65 66 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration