Texto del speech de la parte de AURA en el MWC 2019 hecho por Chema Alonso. Más información en el artículo de El lado del mal: https://www.elladodelmal.com/2019/03/el-guion-de-una-charla-mas-en-el-mobile.html
How Consumers Drive a New Market for Mobile Conferencing ServicesMark Dzwonczyk
Invited presentation at Wainhouse Research annual Conference Service Provider Summit, describing Callvine's approach to the exploding mobile market using a freemium model in which free consumer usage migrates to paid professional usage.
How Consumers Drive a New Market for Mobile Conferencing ServicesMark Dzwonczyk
Invited presentation at Wainhouse Research annual Conference Service Provider Summit, describing Callvine's approach to the exploding mobile market using a freemium model in which free consumer usage migrates to paid professional usage.
Here we have synthesized four important trends in mobile for 2016:
1.) Mobile Screens Are Now The Primary Screens
2.) Retail Shifts to Mobile
3.) Internet of Things (IoT) Is A Mobile Sales Bonanza
4.) Ad-Blocking Moves to Mobile
Zoomy Media International Ltd expands it domestic service to Southeast Asia by dint of Big Data and Cloud Computing. Accumulating Internet customers by WIFI equipment renting which forms the basis of flux and service charge. It profits from commercial patterns such as content distribution, content provision and advertisement.
What are the Most Promising Top 10 Mobile Application Development trends?Chetu
Mobile App development is currently one of the fastest-growing industries. There is currently more than 5 billion mobile subscribers and those numbers are continually growing. The mobile app economy is expected to be worth more than $6 trillion by the year 2021, which is only expected to grow.
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0...Telefónica
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0xWord escrito por Ibón Reinoso ( https://mypublicinbox.com/IBhone ) con Prólogo de Chema Alonso ( https://mypublicinbox.com/ChemaAlonso ). Puedes comprarlo aquí: https://0xword.com/es/libros/233-big-data-tecnologias-para-arquitecturas-data-centric.html
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordTelefónica
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy (Guillermo Obispo https://mypublicinbox.com/Willy_ ) en 0xWord. Puedes comprar el libro aquí: https://0xword.com/es/libros/232-historias-cortas-sobre-fondo-azul.html
Here we have synthesized four important trends in mobile for 2016:
1.) Mobile Screens Are Now The Primary Screens
2.) Retail Shifts to Mobile
3.) Internet of Things (IoT) Is A Mobile Sales Bonanza
4.) Ad-Blocking Moves to Mobile
Zoomy Media International Ltd expands it domestic service to Southeast Asia by dint of Big Data and Cloud Computing. Accumulating Internet customers by WIFI equipment renting which forms the basis of flux and service charge. It profits from commercial patterns such as content distribution, content provision and advertisement.
What are the Most Promising Top 10 Mobile Application Development trends?Chetu
Mobile App development is currently one of the fastest-growing industries. There is currently more than 5 billion mobile subscribers and those numbers are continually growing. The mobile app economy is expected to be worth more than $6 trillion by the year 2021, which is only expected to grow.
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0...Telefónica
Índice del libro "Big Data: Tecnologías para arquitecturas Data-Centric" de 0xWord escrito por Ibón Reinoso ( https://mypublicinbox.com/IBhone ) con Prólogo de Chema Alonso ( https://mypublicinbox.com/ChemaAlonso ). Puedes comprarlo aquí: https://0xword.com/es/libros/233-big-data-tecnologias-para-arquitecturas-data-centric.html
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy en 0xWordTelefónica
Índice de libro "Historias Cortas sobre Fondo Azul" de Willy (Guillermo Obispo https://mypublicinbox.com/Willy_ ) en 0xWord. Puedes comprar el libro aquí: https://0xword.com/es/libros/232-historias-cortas-sobre-fondo-azul.html
Índice del libro: Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición ...Telefónica
Índice del libro: "Máxima Seguridad en Windows: Secretos Técnicos. 6ª Edición Actualizada con nuevos contenidos" escrito por Sergio de Los Santos ( https://MyPublicInbox.com/SSantos ) en 0xWord. Puedes comprarlo aquí: https://0xword.com/es/libros/22-libro-maxima-seguridad-windows.html
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Co...Telefónica
Índice del libro "Amazon Web Services: Hardening de Infraestructuras Cloud Computing" de Abraham Romero https://mypublicinbox.com/martrudix publicado por 0xWord. Puedes comprarlo online aquí: https://0xword.com/es/libros/229-amazon-web-services-hardening-de-infraestructuras-cloud-computing.html
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de ...Telefónica
Índice del Libro "Ciberestafas: La historia de nunca acabar" (2ª Edición) de 0xWord de Juan Carlos Galindo ( https://mypublicinbox.com/galindolegal ) con prólogo y epílogo del Sr. Juez Eloy Velasco ( https://mypublicinbox.com/eloyvelasco ) y Chema Alonso ( https://mypublicinbox.com/ChemaAlonso )
Índice del Libro "Storytelling para Emprendedores"Telefónica
´Índice del Libro "Storytelling para Emprendedores" escrito por Roda Padadero ( https://MyPublicInbox.com/RosaPanadero ) de 0xWord.Puedes comprarlo online aquí: https://0xword.com/es/libros/224-storytelling-para-emprendedores.html
Presentación de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ) realizada en la DotNet 2023 en Madrid sobre Latch Web3. Más información en: https://www.elladodelmal.com/2023/05/latch-web3-un-pestillo-de-seguridad.html
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Edition)"Telefónica
Índice del libro "Hardening de servidores GNU / Linux 5ª Edición (Gold Editon)" de 0xWord. Puedes comprarlo aquí: https://0xword.com/es/libros/38-libro-hardening-servidores-linux.html
Escrito por Pablo González: https://MyPublicInbox.com/PabloGonzalez y Carlos Álvarez Martín
Índice del libro de "WhatsApp INT: OSINT en WhatsApp" de 0xWord escrito por Luis Márquez ( https://mypublicinbox.com/luismarquezEs ). Puedes comprar el libro en 0xWord.com: https://0xword.com/es/libros/219-whatsapp-int-osint-en-whatsapp.html
Índice del libro "De la Caverna al Metaverso" de 0xWord.comTelefónica
Índice del libro "De la Caverna al Metaverso" de 0xWord, escrito por Felipe Colorado Lobo [Contacto: https://mypublicinbox.com/FColorado ] Puedes comprarlo online en: https://0xword.com/es/libros/217-de-la-caverna-al-metaverso-un-relato-disruptivo-de-la-tecnologia.html
20º Máster Universitario de Ciberseguridad UNIRTelefónica
Programa del 20º Máster Universitario de Ciberseguridad UNIR.
Apadrinado por Chema Alonso. Más información en: https://estudiar.unir.net/es/es-esp-ma-ing-master-ciberseguridad/
BootCamp Online en DevOps (and SecDevOps) de GeeksHubs AcademyTelefónica
Descripción del BootCamp Online en DevOps (and SecDevOps) de GeeksHubs Más información en la web del curso. https://geekshubsacademy.com/producto/devops/
Índice del libro "Ciberseguridad de tú a tú" de 0xWordTelefónica
Índice del libro "Ciberseguridad de tú a tú" de 0xWord que puedes comprar online: https://0xword.com/es/libros/216-ciberseguridad-de-tu-a-tu-lo-que-tienes-que-conocer-para-sentirte-mas-seguro.html
Está escrito por Yolanda Corral ( https://mypublicinbox.com/yocomu ) que dirige el Canal de Youtube y Podcast "Palabra de Hacker" ( https://www.mypublicinbox.com/palabradehacker ).
Epílogo de Angelucho : https://www.mypublicinbox.com/Angelucho
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Ide...Telefónica
Índice del libro "Open Source INTelligence (OSINT): Investigar personas e Identidades en Internet 2ª Edición" de 0xWord, escrito por Carlos Seisdedos ( https://www.mypublicinbox.com/carlos_seisdedos ) y Vicente Aguilera ( https://mypublicinbox.com/VicenteAguileraDiaz ). Puedes comprar el libro en : https://0xword.com/libros/162-open-source-intelligence-osint-investigar-personas-e-identidades-en-internet.html
Índice del libro "Social Hunters" de 0xWordTelefónica
Índice del libro "Social Hunters" de 0xWord, escrito por Marta Barrio ( https://mypublicinbox.com/martrudix ) y Carolina Gómez ( https://mypublicinbox.com/Carol12Gory ) sobre el mundo de los hackers que utilizan técnicas de Ingeniería Social. Puedes comprarlo en: https://0xword.com/es/libros/215-social-hunters-hacking-con-ingenieria-social-en-el-red-team.html
Índice del libro "Kubernetes para profesionales: Desde cero al despliegue de ...Telefónica
Índice del libro de 0xWord "Kubernetes para profesionales: Desde cero al despliegue de aplicaciones seguras y resilientes" que puedes comprar aquí: https://0xword.com/es/libros/213-kubernetes-para-profesionales-desde-cero-al-despliegue-de-aplicaciones-seguras-y-resilientes.html Escrito por Rafael Troncoso ( https://mypublicinbox.com/rafaeltroncoso )
Los retos sociales y éticos del MetaversoTelefónica
Las empresas están comenzando a explorar las muchas oportunidades comerciales nuevas que ofrece. Sin embargo, de inteligencia artificial hemos aprendido que también existen posibles consecuencias éticas y sociales negativas asociado al uso masivo de estas tecnologías.
Richard Benjamins [ https://mypublicinbox.com/rbenjamins ] (Chief AI & Data Strategist), Yaiza Rubio [ https://MyPublicInbox.com/YrubioSec ] (Chief Metaverse Officer) y Chema Alonso [ https://MyPublicInbox.com/ChemaAlonso ] (Chief Digital Officer) de Telefónica abordan esta temática en un informe llamado “Social and ethical challenges of the metaverse” donde describen qué es el Metaverso, qué tecnologías forman parte de su ecosistema y de dónde proviene. Después se enfocan en los posibles riesgos sociales y éticos del metaverso y cómo mitigarlos. Finalmente, concluyen que las empresas que actualmente están implementando el uso responsable de la IA, están bien preparadas para prevenir o mitigar los riesgos sociales y éticos del metaverso. No porque conozcan el futuro, sino porque cuentan con la gobernanza y la cultura adecuadas para hacer frente a tales riesgos. Más info: https://www.telefonica.com/es/sala-comunicacion/los-retos-sociales-y-eticos-del-metaverso/
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWordTelefónica
Índice del Libro "Ciberestafas: La historia de nunca acabar" de 0xWord escrito por Juan Carlos Galindo ( https://MyPublicInbox.com/Galindolegal ) con Prólogo de Chema Alonso ( https://MyPublicInbox.com/ChemaAlonso ). Puedes comprarlo en: https://0xword.com/es/libros/205-ciberestafas-la-historia-de-nunca-acabar.html
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
1. Diapo 1
1) This is the third year talking about our digital transformation
based on the vision of the fourth platform. As we’ve been
sharing with you years ago, the 4th
platform is the core for
Telefonica to be a data-driven company.And followingit, wasn´t
an easy path.
2) At the beginning,fourth platform was just an analogic draw our
president did to all of us. I must say, first time I saw it, I really
thought he was joking.Doing that meant huge amount of work.
3) I added AURA to the picture and looked for the best partner to
make it real.We were goingto do a true AIinside Telefonica,and
we could foresee a lot of work ahead,so better to havethe right
partners.
4) Today4th
platform is working and growing in every country,but
It was just 100 kB when it was just a picture. I really loved both
pictures,first one,because is ourpresident showingus the path.
Second one is about me trying to convince Mr. Nadella at
Microsoft offices to invest and help us to do AURA.And all that I
had at that time was just this wonderful picture I drew for him.
5) But time has passed and today 4th
Platform is normalizing and
storing Personal Data Spaces for 178 million customers in the
seven countries in which we deployed it so far. It normalizes
actions for 34 API families and supports more than 30 solutions.
Just to understand what a solution is for us, Aura is only one of
them, and the rest are internal use cases for efficiencies and
business opportunities.
6) 4ht Platform supports more than 120 million operations per
month,what means It has become the new platform to integrate
or develop new digital services in Telefonica.
2. Diapo 2
1) This is how the 4th
Platform looked like more or less in term of
structure last year. Actually,we finished last yearevent with this
slide. In it, you can see different pieces.
2) Data is generated in the first, second and third platform.It goes
to the Personal Data Spaces in the 4th
Platform where it is stored
and processed to generate insights. Customers can do actions in
Telefonica using AURA interacting with cognitive services
through different channels, like apps, Movistar Home, Smart
devices or social networks.
3) And, we were integrating our 4th
Platform with different
partners and other companies to expand data control for our
customers and experiences they can enjoy.
4) This was the finishing slide last year, but It wasn´t a full stop. It
was just the beginning of a new year working in the growth of
our strategy, and we were just thinkingabout next steps at that
time.
5) In the end, having the 4th
platform allowed us to integrate all
pieces and use AURA in all of them. It was an opportunity for
making AURA bigger and more open.
Diapo 3
1) Today, our customer can interact with Telefónica using mobile
apps, webs, TV, Movistar Home and of course, our cognitive
intelligence. This new way of interacting with Telefonica, just
talkingto AURA is available in 6countries,(well,seven next week
that it will be live in Ecuador).
2) Aura is accessible through more than 20different channels,with
around 1000 use cases in total. And this is the way to interact
3. with Telefonica for 2 Million customers per month.And the best
is that this number is growing every month.
3) One of the countries in which AURA is aliveand more developed
is VIVO, our operationin Brazil,and Christian Guevara,ourCEO
is going to explain how big it is there.
CG
Diapo 4
1) Thanks Christian.
2) As you can see, Aura is a key element for us, and this year it will
be live in 9 countries, in more channels, with more use cases –
including third party ones – and we estimate to achieve 120
million conversations using Cognitive AI.
3) Every day, talking to technology in natural language is the way
selected for more customers to interact.
Diapo 5
1) And we are making Aura alive in the core of our services. Home
of our customers.
2) Telefónica is the first technology provider in many of the
countries in which we operate.
3) We’ve been digitalizingourcustomers home not onlywith state
of art devices that we create, but also with services. Some of
them from Telefonica,some of them from third parties that we
integrate.
4) Todaywe haveWi-Fi routers,communications,apps,TVservices
and IoT, but also billing, authentication or insights in our
customers’ home.
4. 5) We see every home as a computer with infinite possibilities of
creating new experiences.
Diapo 6
1) That experiences could be run at home using all devices and all
services.
2) It is every partner we are integrating in our 4th
Platform the one
who chooses the way.
3) We have integration with Netflix based on our Set Top Box and
remote. We have Twitter integrated in Movistar Home and
Facebook Safety Check into Aura, but we could go further, and
the question was “why not?”.
4) Using this vision of Home as a Computer, we create a new way
of developing experiences at home, in which AURA let our
partners to enrich ourcustomers livewith the right use cases to
be enjoyed at home.
5) We call them, Living Apps, and let me explain how they work
with some examples.
Video 1:
1) One ofthe services we provide in Telefonica is MovistarCar.Our
customers can control their car from an app.
2) It uses the power of IoT and Cloud technologies to control
vehicles.
3) But having this service integrated as a Living app, users can
receive alerts through AURA, SMS, Movistar Home or the app
and open a Living app to control it from TV, using just the voice.
Or the remote.
Video 2:
5. 1) We can have more or less the same experience with SmartWifi,
our Wi-Fi securityand managementservice.Now,ourcustomers
will be able to see all devices connected in a map they can
project on TV. Using voice, they can control the security of their
Wi-Fi network easily.
2) Get details about devices or stopping providing connectivity to
them.Great feature, ifyou want yourkids comingto havedinner
on time.
Video 3:
1) And we did the same with other service like MovistarCloud.This
Living App is allowing our customers to see their pictures and
videos on TV, just talking AURA or using Movistar Home to
control everything.
2) And our Home as a Computer platform is open to integrate
experiences from other companies.
3) We don´t want them to migrate theirmobileapps orwebsites to
TV. We want them to provide our customers the best
experiences though Living Apps at Home.
Video 4:
1) For instance, this living app from Atletico de Madrid,one of the
best football teams that has one of the most digitalized and
advanced stadiums in the world,allows theirsupporters to have
direct information aboutthe next match just openingthe Living
app.
2) Information like TV channel in which the next match is going to
be aired, but also weather forecasting, estimated time to get to
the stadium (by car or by public transportation) from home.
6. 3) But also allows supporters to do some actions in Atletico de
Madrid. Actions like yielding the football pass or buying a VIP
upgrade.If customer decide to yield their football pass to other
supporter,livingapp leverages of another Telefonica service for
strong authentication. In this case Mobile Connect,to verify the
real identity through a challenge.
Video 5:
1) In the case of El Corte Ingles, the biggest retailer in Spain,
customer can enjoy TV and receive information related to
special items using Second Screen services in Movistar Home.
2) Like a special T-Shirt or a special product from a TV program. In
this case a ball from an Atletico match. These items can be
stored in a Wishlist and customers can use a Living App to
manage their Wishlist and buy the objects.
3) In this case, just using voice and TV to control it and a QR Code
to connect with El Corte Ingles mobile App.
Video 6
1) Last example is AIR Europe, one of the most relevant airlines in
Europe.This LivingApp brings theircustomer the full experience
to check in a flight when it is available just answeringquestions.
2) As you can see, Air Europa uses voice to let control the seat
selection (which is based on Machine Learning techniques), to
add special items to be carried or anyother preference available
in the flight.
3) Once it is done, customers will receive boarding pass in their
app, e-mail or through an SMS code.
4) A Full Online Check-in for your next flight just from your living
room and in a few seconds. I really love this Living App.
7. Diapo 13:
1) As you could see in the demos, having the 4ht Platform open to
develop new services and integrate third party ones, plus our
home as computer ecosystem to run living app, allows us to
enrich our customers live with new experiences.
2) It is not only about digitalizing our customer homes with best
devices.
3) It is not only about creating the best services to be enjoyed at
home.
4) It is not onlyabout integratingthe best third party products and
services.
5) It is about to do everythingthinkingabout people living seamless
experiences at home.
Diapo 14:
1) To finish this part, I would like to let you a new picture. A new
last slide with our 4th
Platform for 2019.
2) An open platform to make available technology for our
customers in the easiest way with the only vision of enriching
their lives.
3) See you next year, that now I have a lot of work to be done.