We're well past the time that technologists once predicted there would be a modem on everyone's key ring. And no, I don't mean Wi-Fi. A future Internet will incorporate things, but not the way it's been predicted.
Surely it's happened to you: You've gotten those fake phone calls from "Windows Company" saying your PC is infected, and please install this keylogger. And you may have reported them. But why haven't they stopped?
The echo chamber of the Web in the wake of Robin Williams' death has resounded with such an ugly noise that his daughter has shut it off.
Intel has already demonstrated its willingness to differentiate its Xeon CPUs for certain customers who want to build custom servers with it. How far will this customization extend into the telco space?
Could Intel's next Xeon provide acceleration functions to NFV? Even though Intel's pre-release responses are limited, what we know now still speaks volumes.
Every week, I get this question from someone at least once: What's the difference between the "Telecom" in FierceTelecom and the "Communications" in FierceEnterpriseCommunications?
The problem of securing identity in a network of both mobile devices and clouds is only growing more complex. A solution may require us to transcend what we think we know.
The new alliance means IBM will be selling iPads, and Apple will be making room for IBM enterprise services. Sensible enough. But partnerships require communication, and only one of these two is good with that.
A cryptographic protocol involving secret codes and device-to-device handshakes brings into question whether technology can actually drive away the world's last remaining voters.
As Google begins its effort to comply with Europe's "right to be forgotten" law, more is now known about what's being forgotten than ever before.