Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Internet of People. A primer on people tracking IoT technology How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm
  • Big Data
    • Is Data Science the Answer to Ocean Pollution? Artificial Intelligence for warfare or for maintaining peace
  • Cybersecurity
    • Challenges and Business Opportunities of Post Quantum Cryptography Cyber Security Weekly Briefing 18-24 September

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

ProTrain Project: Big Data to optimise regional traffic in Germany

Transport planning within major cities is becoming a worldwide issue as more and more people are moving to cities like Berlin which in turn has put urban transport under...
Paloma Recuero de los Santos

How can Brand Sponsored Data be used as a marketing tool for video advertising?

(Content written by Cambria HAYASHINO) Connecting with customers while they are on the go is crucial for every successful marketing and sales campaign. More and more companies have realized that...
AI of Things

How can Big Data help to improve the financial scoring process?

Content written by Daniel Torres Laguardia, Head Scoring (data product) Michael wants to apply for a financing of its recent TV purchase, and wait… he needs to be checked. And after...
AI of Things

How is Big Data influencing the recruitment process?

Big Data has became a phenomenon that is almost affecting every business and sector around the globe. From financial services, optimising services for cities and even monitoring the weather,...
AI of Things

What do Big Data, Algorithms and Netflix have in common?

Netflix has become a worldwide phenomenon with over 98 million customers streaming worldwide. The amount of data generated from that amount of users can be directly reinvested in the...
Cascajo Sastre María

Quantum computing in the future of IoT

Connected devices, the people who use them, and the places that harbour them are growing at extraordinary rates. In order to maintain this current growth rate, we must look...
AI of Things

How has the NFL Super Bowl evolved with the introduction of Big Data?

Last year saw the 50th anniversary of the NFL Super Bowl and it is clear that it has become one of the most hotly anticipated events of the year,...
AI of Things

Big Data combating crime in New York

Original content from Lourdes Tejedor, Community Manager and Editor at Telefonica. One city: New York; one problem: crime. How can we contain and control it? When and where is it...
AI of Things

Case Study: How Jacobs is using LUCA Transit to Improve Transport Planning in the UK

  Transportation infrastructure forms an integral part of our daily journeys around the world. Whether it is workers on a daily commuter train, travelers catching a plane for a business...
ElevenPaths

Securing a Cloud Environment With a Telco Cloud Provider

Nowadays, nobody can deny the remarkable benefits of cloud computing, both infrastructure as a service (IaaS) and software as a service (SaaS). Cloud computing drives cost savings, agility to...

Navegación de entradas

Previous articles
1 … 105 106 107 … 122
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration