Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Worker’s Diary IoT III Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project
  • Big Data
    • How do you capture clients on multiple channels? How to select AI and Big Data use cases?
  • Cybersecurity
    • Telco’s: as a major player in the cyberspace Cyber Security Weekly Briefing, 19 – 23 June
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Smart City IoT

Nacho Palou

Key ingredients for today’s Smart Cities

The term Smart City used to refer to “cities of the future”, but Smart Cities are increasingly turning the present. Thanks to the use of digital solutions such as...
Photo: Aditya Chinchure / Unsplash
Olivia Brookhouse

How to build a Smart City: with IoT and Big Data

A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Patrick Buckley

Smart Stadiums: How 5G is revolutionising live Sports

As we all look forward to returning to live events in a post-pandemic world, in today’s post we share with you the latest exciting innovation in smart stadiums,...
AI of Things

What is a connected car and how can it improve the driving experience?

Every day, we are surrounded by devices that are connected to the Internet. We only need to turn our eyes in any direction, and we can see televisions, coffee...
Beatriz Sanz Baños

Your city is more accessible with IoT

According to the latest data from the National Statistics Institutethere are 3.84 million people with some type of disability in Spain. A figure to bear in mind since it makes...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration