Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Click & Go, the multipurpose button Take control of your vehicles with Fleet Optimise
  • Big Data
    • 5 reasons why everyone wants to learn Python Entrevista: Angela Shen-Hsieh desmitifica“la caja negra” del Big Data
  • Cybersecurity
    • Cyber Security Weekly Briefing, 5 – 11 November Challenges and Business Opportunities of Post Quantum Cryptography

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Reducing travel delays using Big Data

When we travel by public transport, there are a number of factors that affect our satisfaction with the journey.  Sadly, data science can’t help us to enjoy seats that...
ElevenPaths

Monero says goodbye to the ASIC miners (at least for now)

Last Friday, 6th April marked an important date for the community of Monero users and developers, as one of the cryptocurrencies led the defense of anonymity for its users. As already commented...
AI of Things

More countries focus on Artificial Intelligence

Many countries are getting up to speed with the benefits of Artificial Intelligence, how it improves processes and make use of data. Previously, this post in the blog featured...
AI of Things

Data Attributes: the new Digital Identity Currency

The 2018 edition of the Mobile World Congress took place in Barcelona between the 25th and 28th of February. During the event, a panel discussion took place that featured...
ElevenPaths

Accelerating European cyber security between the United Kingdom and Telefonica (Wayra) – Part one of two

The GCHQ (Government Communications Headquarters) is not very well known outside of the United Kingdom. The governmental organization is almost a century old (it will celebrate its 100th anniversary...
ElevenPaths

#CyberSecurityPulse: Tell me your social networks and you will be welcome in the United States (or maybe not)

The US Department of State wants to ask visa applicants to provide details of their social networks which they have used within the last five years, as well as...
AI of Things

Weve launches Weve Locate – Location verification technology

Weve, O2´s mobile advertising subsidiary has recently launched a new service, Weve Locate, a location verification product. This new service will allow advertisers to truly reach their target audiences,...
ElevenPaths

The Wannacry authors also want their Bitcoin Cash

The 12th of May 2017 was a day for many of us which we will not easily forget. Wannacry was one of those incidents which had a major impact...
AI of Things

Using Big Data to combat Air Pollution in Brazil

Content originally written by Raquel Carretero Juárez, for the Telefonica Public Policy Blog.   Telefónica Brazil is using mobile network Big Data to monitor air pollution in São Paulo (Brazil) and...
ElevenPaths

#CyberSecurityPulse: PyeongChang Olympics: A New False Flag Attack?

A postmortem of the Olympic Destroyer malware used in the PyeongChang Olympics attack reveals a deliberate attempt by adversaries to plant a false flags when it comes to attribution,...

Navegación de entradas

Previous articles
1 … 81 82 83 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration