Beatriz Sanz Baños Your children’s toys are now connected Smartwatches, drones, lights controlled from our mobile or connected scooters are already a reality in our everyday life. Connectivity and data storage have been gradually taking over the consumer...
Beatriz Sanz Baños The heart of the airports pumps with IoT The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
Beatriz Sanz Baños IoT to improve your Tourist Experience Would you like to enjoy a more personalized and efficient experience during your vacation? The arrival of IoT is already a real revolution in the tourism sector where this...
Beatriz Sanz Baños IoT and everything under control With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Beatriz Sanz Baños The emotions of IoT Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
Beatriz Sanz Baños Fashion connected: the IoT revolution in the textile sector Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños Blockchain opportunities for IoT Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María 5 amazing things at CES 2018 The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
Mirian Martinez Varas The 10 best blogposts of 2017 The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to survey the best articles published during...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Beatriz Sanz Baños IoT Trends for 2018, connectivity in the limelight In 2017, we have seen the rise of technologies associated with Big Data, the popularization of VR and the emergence of autonomous cars. But much still remains to be...
Cascajo Sastre María Quantum computing in the future of IoT Connected devices, the people who use them, and the places that harbour them are growing at extraordinary rates. In order to maintain this current growth rate, we must look...
Beatriz Sanz Baños Chuck Martin: “The industry can anticipate consumers’ needs even before they feel that need. This is the future that awaits us on Internet of Things” Internet of Things has become a fixture of our daily lives. Currently, we are equipped with a set of technologies and uses, an ecosystem, that is alive and in full...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...