Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT transforms the gaming universe Artificial Intelligence: a companion to fight loneliness
  • Big Data
    • Voluntechies, bringing virtual reality to hospitalized kids Could Big Data solve the music industry’s problems?
  • Cybersecurity
    • Detecting the Indicators of An Attack #LadyHacker: for yourself and for them

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Machine Learning identifying rare genetic disorders

Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces?  The quantity of genetic illnesses is so...
AI of Things

Artificial Intelligence converts thoughts into speech

Neuroscientists at Columbia University have discovered a ground-breaking way of turning thoughts into speech, that could potentially give individuals who have lost their ability to speak a voice. Professor Mesgarani...
Paloma Recuero de los Santos

Python for all (4): Data loading, explorative analysis and visualisation

Now we have the environment installed, and we have had some practice with commands and we have learnt the various libraries, and which are the most important. The time...
AI of Things

Artificial Intelligence Fighting Fraud and False Declines

Through the use of Decision Intelligence and Artificial Intelligence Express platforms, Mastercard have harnessed the power of predictive analytics and machine learning to reduce the rate of false decline...
Paloma Recuero de los Santos

Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need?

We are taking another step in our learning of Python by studying what the modules are, and, in particular the libraries.  We will see what purpose some of them...
The hugest collection of usernames and passwords has been filtered…or not (II)
ElevenPaths

The hugest collection of usernames and passwords has been filtered…or not (II)

Over the last entry we focused on analyzing the content of these files from a critical point of view, this is: on clarifying that when a massive leak freeing...
Richard Benjamins

Towards a new Big Data ecosystem to mitigate Climate Change

Big Data can be used to help fight Climate Change [1],[2],[3]. Several projects have analysed huge amounts of satellite, weather and climate data to come up with ways to...
Paloma Recuero de los Santos

Python for all (2): What are Jupyter Notebooks?

What are the Jupyter Notebooks? The Jupyter Notebooks is maybe the most well know application of the Jupyter Project, created in 2014 with the objective of developing open-source software,...
Gonzalo Álvarez Marañón

Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
Carlos Alberto Lorenzo Sandoval

Towards the Fourth Industrial Revolution

The customization of mass production is the catalyst for change that, among other things, originates industry 4.0 A lot has happened since the steam engine changed the course of our...

Navegación de entradas

Previous articles
1 … 69 70 71 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration