Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Technology for the planet GeoGestión, the Internet of Mobile Workforces
  • Big Data
    • Understanding clients of La Vaguada shopping center How IoT and Big Data is elevating Energy Management
  • Cybersecurity
    • Cyber Security Weekly Briefing 24-30 July Fileless Malware: A Growing but Controllable Attack
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Emilio Moreno

Telecommunications Engineer from the Polytechnic University of Madrid. I have been living and working in the cloud for a decade, and I currently work in product management at Telefonica Cybersecurity & Cloud Tech. Here I combine technology with business (with the usual Excel sheets) in VDC and VDC-Edge services, our commercial Edge Computing service. When I'm not in the cloud I like to travel, go for walks with my wife and read about historical topics.



Photo: Denys Nevozhai / Unsplash
Emilio Moreno

Latency and Edge Computing: Why is it important?

For many years we have been in a race to increase the speed of our connections. Ever since those modems that treated us to a symphony of beeps, the...
Life on the border
Emilio Moreno

Life at the border

Today’s article is not going to be about cowboy movies, nor about the Limes of the Roman Empire, nor about Radio Futura’s song even though it may seem like...
Emilio Moreno

2021: the year Edge Computing came into our lives

As we come to the end of the year, it is a good time to look back and see how the Edge has come into our lives. In my...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Android malware not only posing as Word documents… but Excel as well
China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration