Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Smart mining revolution How to build a Smart City: with IoT and Big Data
  • Big Data
    • Data to build a better construction sector Our Christmas Lip Sync
  • Cybersecurity
    • Cybercrime, a constant threat to all types of companies Cyber Security Weekly Briefing, 17 — 23 September

  • The IoT Life
    • Beatriz Sanz Baños
      Your city is more accessible with IoT
      According to the latest data from the National Statistics Institutethere are 3.84 million people with some type of disability in Spain. A figure to bear in mind since it makes...
      Olivia Brookhouse
      When will Robots find a place in the Smart Home?
      With the mass introduction of smart speakers, smart doorbells, smart fridges and even smart toilets there is a world of possibilities when it comes to innovating our homes. Whilst...
    • Hide
      • Personal Life
      • Utilities & Home
      • Mobility & Transportation
    • Hide
      • Retail
      • Cities
      • Industry & Energy
  • IoT Evolution
    • Luis Simón Gómez Semeleder
      Now cycling is safer thanks to drones and IoT
      How many of us don’t feel safe overtaking a bike on the road?  The truth is that while driving a car we could be presented with a dangerous situation,...
      Beatriz Sanz Baños
      IoT for a better world
      The Sustainable Development Goals (SDGs) are a United Nations-led initiative to address the most important problems our society faces. It encompasses “a set of interconnected social, economic and environmental...
    • Hide
      • Networks & Connectivity
      • Environment
      • Digital Transformation
    • Hide
      • Technology
      • Social Issues
Beatriz Sanz Baños

Click & Go, the multipurpose button

What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños

Connected Health, or IoT as your best lifeline

IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...
Beatriz Sanz Baños

The End of Internet as we know it

This post is part one of a two post series that will explore how communications are not only affected by the paradigm shift of connecting everything but a driving...
Beatriz Sanz Baños

Reviewing what makes a smart city smart

Smart Cities are no longer a promise of the future but an increasing priority for local, regional and countrywide governments and a flourishing business area for technological firms and...
Beatriz Sanz Baños

The impacts and benefits of telemetry in Industrial m2m processes

Industrial m2m solutions apply to different fields of industrial processes and can be used in different ways instead of having clear use cases like other more traditional m2m solutions. The...
Beatriz Sanz Baños

Kevin Ashton just asks companies to use the IoT

Acknowledged as the creator of the expression “Internet of Things” and precursor of a global standard system for Radio Frequency Identification (RFID), Kevin Ashton chatted with m2m Telefónica about the current...
María Cascajo Sastre

10 features that the city of the (near) future will have

The city of the future will provide citizens with a more comfortable life thanks to M2M technology. Some advances are already making their way into our urban environments and...
Beatriz Sanz Baños

What is the difference between M2M and IoT?

Once a trend, the Internet of Things has become a reality that is changing the world in which we live. However, buzzwords can sometimes lead to confusion and cause questions...

Navegación de entradas

Volver a portada
1 … 13
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration