Beatriz Sanz Baños Distribution and Logistics Companies IoT technology services are already applied in the distribution and logistics industry to optimize different processes. This has a positive effect on the productivity, security and the preventive maintenance...
AI of Things What is a connected car and how can it improve the driving experience? Every day, we are surrounded by devices that are connected to the Internet. We only need to turn our eyes in any direction, and we can see televisions, coffee...
Beatriz Sanz Baños IoT and everything under control With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Beatriz Sanz Baños Efficient and responsible milk production We have a new example of how technology can help us form a better society in which the production and consumption of milk is carried out in a sustainable...
Beatriz Sanz Baños The emotions of IoT Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
Beatriz Sanz Baños Fashion connected: the IoT revolution in the textile sector Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños Blockchain opportunities for IoT Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María 5 amazing things at CES 2018 The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
Mirian Martinez Varas The 10 best blogposts of 2017 The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to survey the best articles published during...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Beatriz Sanz Baños IoT Trends for 2018, connectivity in the limelight In 2017, we have seen the rise of technologies associated with Big Data, the popularization of VR and the emergence of autonomous cars. But much still remains to be...
Cascajo Sastre María Quantum computing in the future of IoT Connected devices, the people who use them, and the places that harbour them are growing at extraordinary rates. In order to maintain this current growth rate, we must look...
Beatriz Sanz Baños Chuck Martin: “The industry can anticipate consumers’ needs even before they feel that need. This is the future that awaits us on Internet of Things” Internet of Things has become a fixture of our daily lives. Currently, we are equipped with a set of technologies and uses, an ecosystem, that is alive and in full...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick Who are you going to believe, me or your own eyes? The dilemma of managed security Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...