Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Tech AI of Things made real The Smart mining revolution
  • Big Data
    • How the fashion industry is applying Big Data and AI The 5 most in-demand Big Data profiles in 2017
  • Cybersecurity
    • Cyber Security Weekly Briefing 4-10 September DIARIO: Our Privacy-Friendly Document Malware Detector
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Technology IoT

Beatriz Sanz Baños

IoT and everything under control

With the advent of Iot technology, big companies of hardware (components) and software (programs) have had to develop and adapt new products for these devices. The components become loT How far...
Luis Simón Gómez Semeleder

Now cycling is safer thanks to drones and IoT

How many of us don’t feel safe overtaking a bike on the road?  The truth is that while driving a car we could be presented with a dangerous situation,...
Beatriz Sanz Baños

5G – The Key Technology for the development of IoT

The development of 5G technology represents a disruptive advance in the telecommunications sector. It is a new type of wireless connectivity that provides a higher speed of data transfer...
Beatriz Sanz Baños

IoT Trends for 2017, users in the spotlight

2016 has been the year when connectivity started to change driven by LPWA technologies and Personal IoT gains traction as a scenario where users are the main players. But...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration