Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Ethical IoT: principles for an implementation that respects people’s rights How IoT solutions help us deal with rising energy prices?
  • Big Data
    • AI of Things (V): Recommendation and optimisation of advertising content on smart displays Commuter Traffic: Can Big Data solve the problem?
  • Cybersecurity
    • Cyber Security Weekly Briefing January 2-8 Technology and social psychology applied to Internet consumption: The ” Black Friday” case

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Olivia Brookhouse

Big Data, the fuel for Digital Banks

In 1981, Bill Gates said “640KB will be enough for anybody”. Surpisingly, it was hard even then, to imagine where we would be today; in a sea of data....
Beatriz Sanz Baños

Smart gas stations and how to find them

In the last few years, gas stations started to offer travelers a wide range of possibilities beyond mere refueling. This increases competition between service stations, which is forcing these...
Olivia Brookhouse

The Big Data hiding behind Halloween

Big Data and Artificial Intelligence are shaping the future of business with data insights, personalised content and improved user experiences and Halloween, one of the biggest consumer holidays, is...
Innovation and Laboratory Area in ElevenPaths

EasyDoH Update Hot off the Press: New Improvements and Functionalities

Just a few weeks ago, we launched EasyDoH: an extension for Firefox that simplifies the use of DNS over HTTPS. We have been asked about its improvements and several...
Beatriz Sanz Baños

The heart of the airports pumps with IoT

The total number of travellers in air transport increases each year in a remarkable way, giving rise to an expanding panorama of trips, comings and goings, and visits to...
AI of Things

The highlights of LUCA Innovation Day 2019. What did you miss?

The third edition of LUCA Innovation Day took place on Wednesday the 16th of October, in which we presented the advances developed over the last year by the data...
Innovation and Laboratory Area in ElevenPaths

Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%

Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
Óscar Mancebo

Movistar Living Apps, a new technological experience in the home

The fact that Artificial Intelligence is revolutionising and transforming the telecommunications sector is nothing new. Users, accustomed to dealing with virtual assistants and chatbots, increasingly rely on digital transformation. Anticipating...
Olivia Brookhouse

Artificial Intelligence, doing more than humanly possible since the Greeks

Many of those working in the world of Artificial Intelligence acknowledge the 1950’s as the birth of concepts such as Machine Intelligence and Artificial Intelligence with the creation of...
Beatriz Sanz Baños

IoT and everything under control

With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...

Navegación de entradas

Previous articles
1 … 67 68 69 … 123
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration