Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What role will Data Governance play in the Digital Transformation after COVID-19? Internet of Things… Archaeological Sites
  • Big Data
    • Reducing travel delays using Big Data ProTrain Project: Big Data to optimise regional traffic in Germany
  • Cybersecurity
    • Cyber Security Weekly Briefing 5-11 March #CyberSecurityPulse: Tell me your social networks and you will be welcome in the United States (or maybe not)

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

Smart Cities: Pushing Open Data with Power BI

In this article, which will consist of two posts, we will talk about Smart Cities and how they can use their data to be more “smart.” We will work...
ElevenPaths

Squeezing the numbers and facts of Google’s annual Android security report

Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Richard Benjamins

Artificial Intelligence is disrupting the law as we know it

Years ago, science fiction movies used to seem very futuristic to us – making us feel detached from the remarkable innovations we saw from scene to scene.  However, what...
ElevenPaths

Latch and IoT, a perfect symbiosis

The Internet of Things stopped being the future to become our present. It’s rare that on any given day we do not interact in one way or another with...
Escultura de Miguel Angel
Álvaro Alegría

When Michelangelo invented Big Data

They say that Michelangelo was asked about his impressive technique in sculpting the Pietà in just one piece, his answer was: “The sculpture was already inside of the stone....
AI of Things

5th Annual CDO Forum in London will see Chema Alonso take to the stage

The role of the CDO in today’s business environment has been further cemented by the creation of events like the CDO Forum. This event gives a platform for the...
AI of Things

How can AI enhance Cancer treatment and detection?

The medical sector is constantly trying new medicine and drug combinations to help lead to the most effective cancer treatment. There are an endless number of new cancer drugs...
ElevenPaths

Limiting the use scope of our secrets in Latch with “Limited Secrets”

When creating a Latch app as a developer, Latch provides us with an application identifier (appId) and a secret. These two keys allow us to sign the requests sent...
AI of Things

Strata Data Conference London 2017

The upcoming Strata Data Conference London 2017 event aims to bring together the best data scientists from across the world, presenting the most innovative trends and solutions related to...
AI of Things

World Health Day: Using Big Data to address depression

Last week was World Health Day, sponsored by the World Health Organization (WHO). This year, the day is focused on raising awareness about the prevalence of depression through the “Depression:...

Navegación de entradas

Previous articles
1 … 95 96 97 … 121
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration