Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Sweet dreams with IoT How AI & IoT will save the Aviation Industry
  • Big Data
    • Movistar Team: the best cyclists, the best behind the scenes team, the best strategy and Big Data 4 times Big Data invaded the world of Fashion
  • Cybersecurity
    • How Lokibot, the malware used by Machete to steal information and login credentials, works DNS over HTTPS (DoH) is already here: the controversy is served

  • Artificial Intelligence
  • IoT
  • Blockchain
Beatriz Sanz Baños

Telefónica IoT and Honda reduce motorbikes robbery

Pucallpa, located in the middle of the Peruvian jungle, has a big concern with the safety of their citizens and their vehicles. With a population of 200.000 inhabitants, the motorcycle...
Álvaro Alegría

Macro data, macro responsibility

On the 11th April 1945, just two days before his death, during the celebrations of Jefferson Day, Franklin D. Roosevelt uttered a phrase that would remain forever in history:...
Stefan Leadbeater

AKQA uses AI to develop a completely new sport

As we already know, AI technologies are being used both within sports and to create new sports, but these tend to be very similar to sports which already exist with slight...
Stefan Leadbeater

DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology

DeepMind has partnered with Moorfields Eye Hospital to develop a diagnostic technology to bring to market, which can help to detect the early signs of sight-threatening conditions, which, through...
AI of Things

The use of AI and Machine Learning in the beer industry

Artificial Intelligence has made its way into so many crucial aspects of our lives whether it be in medical care, transport, or even catering, but there are also so...
Stefan Leadbeater

Driverless cars…a reality or a distant dream?

More and more we are seeing different companies developing what they are calling driverless cars, which, in reality are nothing more than cars which have certain aspects of autonomous...
Diego Martín Moreno

Blockchain technology

In the previous article we talked about the basic concepts of the blockchain, and now we will focus on the current technologies to implement a blockchain solution. Blockchain and Smart...
Álvaro Alegría

Don’t give up on human intelligence while adopting the artificial one

Artificial intelligence is here to stay, that’s for sure. Just look at the pink (and not that pink) pages of any newspaper or take a quick look at Linkedin’s...
Stefan Leadbeater

Groundbreaking study exposes the extent of UK gender bias

In previous years, various reforms have been used to combat the labour gap and to “make work pay” for all however we still find ourselves with an issue that...
AI of Things

Chiemsee-Alpenland Tourism and Telefónica Next Examine visitors to the Chiemsee lake

Original post by Cécile Schneider, Telefónica NEXT The touristic region of Chiemsee-Alpenland and our colleagues at Telefónica NEXT used data analysis to examine the profile of visitors to the Chiemsee...

Navegación de entradas

Previous articles
1 … 9 10 11 … 49
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration