Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 10 sensors to create Smart Beaches Energy efficiency switches to the Smart side
  • Big Data
    • How to learn Python: the most important skill for employers Semi-Supervised Learning… the great unknown
  • Cybersecurity
    • Analysis of APPs Related to COVID19 Using Tacyt (II) Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

4 companies using Big Data to address Water Scarcity

Water scarcity is an increasingly serious issue. It is estimated that by 2025, 1.8 billion people will face “absolute water scarcity”. The United Nations recognized the seriousness of this...
Ana Zamora

Hackathons are not just for developers

By Glyn Povah, Head of Global Product Development at LUCA. Hackathon is derived from the English words “hack” and “marathon”, and if you Google the word “hackathon” you’ll get something...
AI of Things

4 Data Enthusiasts changing the world as we know it

It is becoming increasingly apparent that NGOs and governments are creating more roles in the Data Science discipline. Using Big Data for social good is all about coming up with new...
AI of Things

When Big Data meets art

In this world of ours, it is normal to feel overwhelmed by the amount of information, facts and data we encounter everyday – and the quantity we are generating...
AI of Things

How we’re mapping Climate Change with Big Data

At the 2014 U.N. Climate Change Summit in New York City, U.S. President Barak Obama shared his thoughts on the seriousness of climate change. While acknowledging other pressing issues...
AI of Things

5 degree programs for becoming a Data Scientist

At LUCA, our Data Scientists are at the heart of what we do. Recruiting these valuable team members can be a challenge, though, because they are in such high...
AI of Things

Poverty Insights in Guatemala using Big Data

“No poverty” is the first of the U.N.’s 17 Sustainable Development Goals and it is closely linked with several other goals, including zero hunger, reduced inequality, and good health and...
Beatriz Sanz Baños

José Ignacio Guerra: “We’re playing a leading role in IoT scene in Latin America”

The Telefónica R&D centre (TID in Spanish) in Chile is a benchmark for Internet of Things technologies. This is the only research complex in Latin America to bring together all the...
AI of Things

4 times Big Data invaded the world of Fashion

The relationship between Big Data and Fashion stems back to 2013 when giants like ASOS and Gap started to use data to enhance their customer shopping experience – revolutionizing the way consumers buy garments online. 1. Chanel’s Data...
AI of Things

Axonix acquire mobile geolocation startup Statiq

This week, our programmatic trading platform, Axonix, has acquired British mobile geolocation data startup Statiq in our continued pursuit of data-driven business opportunities. The investment has been driven by...

Navegación de entradas

Previous articles
1 … 111 112 113 … 122
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration