Latest Commentary

The one-click battle for the net

We're the Internet, and they're the cable companies, says the latest advocacy group. Click one button to send a meaningless statement about net neutrality and make you feel better about yourself.

The coming public data pollution problem

If Twitter starts rearranging your feed based on what it thinks is relevant, then will all those tools that examine your Twitter feed for things you find relevant, be right or wrong?

Obligatory post-nudity-exposure opinion piece

There comes a point where the sheer volume of "Lessons Learned" pieces in the wake of the Great Celebrity Cloud Hack points to a deeper problem than the ridiculousness of password-based security.

It won't be the Internet of Things as you know it

We're well past the time that technologists once predicted there would be a modem on everyone's key ring. And no, I don't mean Wi-Fi. A future Internet will incorporate things, but not the way it's been predicted.

Windows tech support scam: Have we lost the capacity for anger?

Surely it's happened to you: You've gotten those fake phone calls from "Windows Company" saying your PC is infected, and please install this keylogger. And you may have reported them. But why haven't they stopped?

A death of tact

The echo chamber of the Web in the wake of Robin Williams' death has resounded with such an ugly noise that his daughter has shut it off.

My take on Intel, part 2: Will cloud CPUs separate from on-premise?

Intel has already demonstrated its willingness to differentiate its Xeon CPUs for certain customers who want to build custom servers with it. How far will this customization extend into the telco space?

My take on Intel's near-future support for open standards

Could Intel's next Xeon provide acceleration functions to NFV? Even though Intel's pre-release responses are limited, what we know now still speaks volumes.

What I mean by 'communications'

Every week, I get this question from someone at least once:  What's the difference between the "Telecom" in FierceTelecom and the "Communications" in FierceEnterpriseCommunications?

Where do we plant the root of trust?

The problem of securing identity in a network of both mobile devices and clouds is only growing more complex.  A solution may require us to transcend what we think we know.