We're the Internet, and they're the cable companies, says the latest advocacy group. Click one button to send a meaningless statement about net neutrality and make you feel better about yourself.
If Twitter starts rearranging your feed based on what it thinks is relevant, then will all those tools that examine your Twitter feed for things you find relevant, be right or wrong?
There comes a point where the sheer volume of "Lessons Learned" pieces in the wake of the Great Celebrity Cloud Hack points to a deeper problem than the ridiculousness of password-based security.
We're well past the time that technologists once predicted there would be a modem on everyone's key ring. And no, I don't mean Wi-Fi. A future Internet will incorporate things, but not the way it's been predicted.
Surely it's happened to you: You've gotten those fake phone calls from "Windows Company" saying your PC is infected, and please install this keylogger. And you may have reported them. But why haven't they stopped?
The echo chamber of the Web in the wake of Robin Williams' death has resounded with such an ugly noise that his daughter has shut it off.
Intel has already demonstrated its willingness to differentiate its Xeon CPUs for certain customers who want to build custom servers with it. How far will this customization extend into the telco space?
Could Intel's next Xeon provide acceleration functions to NFV? Even though Intel's pre-release responses are limited, what we know now still speaks volumes.
Every week, I get this question from someone at least once: What's the difference between the "Telecom" in FierceTelecom and the "Communications" in FierceEnterpriseCommunications?
The problem of securing identity in a network of both mobile devices and clouds is only growing more complex. A solution may require us to transcend what we think we know.