Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • An IoT that deserves an Oscar LPWA and 5G networks enable new IoT solutions
  • Big Data
    • Artificial Intelligence in small and medium-sized enterprises Millennials want to use data for social good, but will privacy stop them?
  • Cybersecurity
    • Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org) Do I Really Need an Antivirus?

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Cascajo Sastre María

Using Smart Chatbots as an IoT interface

IoT devices are expected to reach 20.8 billion in number by 2020, and most of the data they produce is best accessed while users are mobile. There are a number...
Cascajo Sastre María

Internet of People. A primer on people tracking IoT technology

Billions of connected things. We hear it all the time. But what does this actually mean? What are those things? Are they only devices? No they are not. We can also...
Cascajo Sastre María

The Internet of Water

Internet of Things is growing at a faster pace than ever before. Its size is expected to quadruple over the next four years. The place where most of this...
Cascajo Sastre María

eSIM cards are here to boost the IoT

SIM cards are much more than what they appear to be. Within an apparently simple rectangular metal chip encased in a plastic carrier is a miniature computer! SIM stands...
Cascajo Sastre María

Shaping IoT: 2G refarming. What does it mean?

2G is a 25 year-old technology – which in tech is a lot. Initially launched on the GSM standard in Finland by Radiolinja. Ever since it expanded to become...
María Cascajo Sastre

Smart Parking, IoT valet parking for Smart Cities

Parking is one of the most repetitive and time consuming activities we carry out in life. We spend on average up to 106 days in our life, finding parking...
María Cascajo Sastre

Bluetooth for IoT, much more than handsfree technology

A few months back we published a whitepaper regarding the disruptive changes in the connectivity ecosystem. The paper stressed the role of low power narrow band wide area networks...
Luis Simón Gómez Semeleder

Drones in Precision Farming

Streamlining and modernizing farming techniques has been a key process since the turn of the century in order to ensure global food supplies. The Food and Agriculture Organization (FAO)...
Beatriz Sanz Baños

Click & Go, the multipurpose button

What are Click & Go Solutions? Click & Go solutions are Telefónica’s innovative approach aimed at providing instant IoT solutions for organizations that traditionally do business in non-connected ways. The...
Beatriz Sanz Baños

Connected Health, or IoT as your best lifeline

IoT started mainly as a way of automating industrial and mechanical processes that relied heavily on human intervention. Yet one of the biggest yearnings of mankind has always been...

Navegación de entradas

Volver a portada
1 … 121 122
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration