Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is Smart Retail? The IoT to protect shipments
  • Big Data
    • Healthy Cities: a new paradigm to humanize smart technology Safer Societies using Facial Recognition
  • Cybersecurity
    • Selecting a managed security service provider (MSSP): 5 key factors to keep in mind Cyber Security Weekly Briefing, 5 – 9 June
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

User experience

Cristina de la Cruz

Do Virtual Assistants improve the user experience with telcos?

Virtual Assistants are more and more relevant in people’s daily lives, especially when it comes to requesting traffic information, reminders, weather reports… However, when it comes to interacting with...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration