Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Bluetooth for IoT, much more than handsfree technology Have you ever wondered where the energy comes from?
  • Big Data
    • “Data, Cloud and AI are the fuel for digital transformation.” Success Story: LUCA Transit and Highways England
  • Cybersecurity
    • Metaverse (II): the challenge of building a virtual space that is secure, inclusive and beneficial to everyone The Pharmaceutical Retail Industry and Their Mobile Applications
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Emilio Moreno

Telecommunications Engineer from the Polytechnic University of Madrid. I have been living and working in the cloud for a decade, and I currently work in product management at Telefonica Cybersecurity & Cloud Tech. Here I combine technology with business (with the usual Excel sheets) in VDC and VDC-Edge services, our commercial Edge Computing service. When I'm not in the cloud I like to travel, go for walks with my wife and read about historical topics.



Photo: Denys Nevozhai / Unsplash
Emilio Moreno

Latency and Edge Computing: Why is it important?

For many years we have been in a race to increase the speed of our connections. Ever since those modems that treated us to a symphony of beeps, the...
Life on the border
Emilio Moreno

Life at the border

Today’s article is not going to be about cowboy movies, nor about the Limes of the Roman Empire, nor about Radio Futura’s song even though it may seem like...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration