AI of Things What is a connected car and how can it improve the driving experience? Every day, we are surrounded by devices that are connected to the Internet. We only need to turn our eyes in any direction, and we can see televisions, coffee...
Beatriz Sanz Baños Your children’s toys are now connected Smartwatches, drones, lights controlled from our mobile or connected scooters are already a reality in our everyday life. Connectivity and data storage have been gradually taking over the consumer...
Beatriz Sanz Baños Smart gas stations and how to find them In the last few years, gas stations started to offer travelers a wide range of possibilities beyond mere refueling. This increases competition between service stations, which is forcing these...
Beatriz Sanz Baños IoT arrives inside the volcanoes Thanks to the installation of sensors inside the crater, the information collected in real time about temperature, humidity and atmospheric pressure, can be accessed. In this way, you have...
Beatriz Sanz Baños The emotions of IoT Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
Beatriz Sanz Baños Fashion connected: the IoT revolution in the textile sector Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños Blockchain opportunities for IoT Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María 5 amazing things at CES 2018 The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
Mirian Martinez Varas The 10 best blogposts of 2017 The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to survey the best articles published during...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Beatriz Sanz Baños IoT Trends for 2018, connectivity in the limelight In 2017, we have seen the rise of technologies associated with Big Data, the popularization of VR and the emergence of autonomous cars. But much still remains to be...
Cascajo Sastre María Quantum computing in the future of IoT Connected devices, the people who use them, and the places that harbour them are growing at extraordinary rates. In order to maintain this current growth rate, we must look...
Beatriz Sanz Baños Chuck Martin: “The industry can anticipate consumers’ needs even before they feel that need. This is the future that awaits us on Internet of Things” Internet of Things has become a fixture of our daily lives. Currently, we are equipped with a set of technologies and uses, an ecosystem, that is alive and in full...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...