Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Internet of Water Bed time will never be the same
  • Big Data
    • Big Data combating crime in New York Internet of Things… Archaeological Sites
  • Cybersecurity
    • If you want to change your employees’ security habits, don’t call their will, modify their environment instead You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Diego Martín Moreno

What are Blockchain and Smart Contracts?

Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
Don’t confuse the frequency of an incident with the ease you remember it
ElevenPaths

Don’t confuse the frequency of an incident with the ease you remember it

Imagine that there have been a few robberies in two parks of your town that have got all the attention for days. This afternoon you would like to go...
AI of Things

Blockchain and IoT predictions for 2019

Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
Beatriz Sanz Baños

Take control of your vehicles with Fleet Optimise

Mobility has become more intelligent thanks to the presence of IoT. In the same way that users use the connected solutions to make more efficient journeys or to park...
ElevenPaths

GSMA IoT Security Champion: Award to our IoT Security team

We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
Paloma Recuero de los Santos

Python for all (5): Finishing your first Machine Learning experiment with Python

We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
Beatriz Sanz Baños

IoT, the new ally of renewable energies?

Since its arrival, IoT has been pushing society towards a future in which most devices will be connected. Climate change and pollution levels also lead us to a future...
AI of Things

The Forrester Wave™: Specialized Insights Service Providers

2018 was an excellent year for us, in which we were recognised as a leader amongst specialized insights service providers by Forrester. The independent review highlights the importance of...
AI of Things

Machine Learning identifying rare genetic disorders

Did you know that Machine Learning is already being used to help doctors identify rare genetic disorders by analysing images of people´s faces?  The quantity of genetic illnesses is so...
Beatriz Sanz Baños

A much safer world is possible thanks to IoT

The police forces usually use reactive methods to stop the damage generated when a crime occurs. However, security measures are being transformed into more preventive actions by allowing them to predict...

Navegación de entradas

Previous articles
1 … 77 78 79 … 123
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration