Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Worker’s Diary IoT III World Environment Day: Green digital transformation as a lever for change
  • Big Data
    • Can Mobile Data combat Climate Change in Germany? 4 companies using Big Data to address Water Scarcity
  • Cybersecurity
    • How language puts business Cybersecurity at risk ElevenPaths Radio English #4 – Privacy and Personal Data Protection

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Álvaro Alegría

Don’t give up on human intelligence while adopting the artificial one

Artificial intelligence is here to stay, that’s for sure. Just look at the pink (and not that pink) pages of any newspaper or take a quick look at Linkedin’s...
Stefan Leadbeater

Groundbreaking study exposes the extent of UK gender bias

In previous years, various reforms have been used to combat the labour gap and to “make work pay” for all however we still find ourselves with an issue that...
AI of Things

Chiemsee-Alpenland Tourism and Telefónica Next Examine visitors to the Chiemsee lake

Original post by Cécile Schneider, Telefónica NEXT The touristic region of Chiemsee-Alpenland and our colleagues at Telefónica NEXT used data analysis to examine the profile of visitors to the Chiemsee...
Anshul Kudal

How to win over the Millennial Shopper? A great personalised experience will make them stay

Data is essential in creating a personalised experience which attract Millennial clients. The obtaining and exchanging of information, always maintaining the privacy of the client, which is key in...
The base rate falacy
ElevenPaths

The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised

Before starting your workday, while your savoring your morning coffee, you open your favorite cybersecurity newsletter and an advertisement on a new Intrusion Detection System catches your attention: THIS IDS...
AI of Things

AI will enable doctors to spend more time with their patients

The technical revolution within the NHS suggested in this report could not have come at a better time. We have doctors and GPs overburdened with more and more patients...
If you want to change your employees’ security habits, don’t call their will, modify their environment instead
ElevenPaths

If you want to change your employees’ security habits, don’t call their will, modify their environment instead

You’re in a coffee bar and you need to connect your smartphone to a Wi-Fi, so you check your screen and see the following options. Imagine that you know...
New born gazelle
Rubén Granados

Reinforcement learning…. the new player

Here, we would like to present a ´new´ guest, reinforcement learning (RL). Not as new, because it has been with us since the 80s. We will quickly go over the classic approximations, that...
Beatriz Sanz Baños

Park your car with IoT

Parking your car has turned into a difficult task in many cities. Looking for a space is a constant source of stress for citizens. Luckily, Internet of Things was born to...
Beatriz Sanz Baños

IoT is increasingly getting safer

Technology is constantly evolving and offering new applications to users. There are always risks when innovating and putting these inventions into practice is more likely when the risks are...

Navegación de entradas

Previous articles
1 … 76 77 78 … 122
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration