How can the largest producer of collaboration appliances make collaboration work where appliances typically don't? Cisco engineers are tackling the problem before they're tackled by it.
The problem of securing identity in a network of both mobile devices and clouds is only growing more complex. A solution may require us to transcend what we think we know.
The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.
Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.
It looks like an open source, on-premise implementation of Dropbox. Look closer, though, and you'll see a way to securely open up object stores on an OpenStack platform.
The way to implement higher bandwidth services on the way to 10gig involves the deployment of a quality-of-service management technique that net neutrality regulations might prohibit.
Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads.
If a champion of the people was supposed to have emerged from the "public dialog" about how the Open Internet problem was to sort itself out, that champion was difficult to see for all the smoke.
Separated by 4.6 miles of fiber from the customer edge, a select customer exchanged Ethernet traffic with the telco over a 100GigE connection.
The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.
While some net neutrality advocates have elevated the issue to the level of a human rights debate, one advocate is suggesting it be deflated to that of a business arrangement.
Citing a 2011 Second Circuit decision that quotes the Copyright Office's own interpretation of the law, the Copyright Office holds fast to that interpretation, even though it directly contradicts the high court.
You know that Microsoft hasn't quite yet joined the world of you and me when the functions of running the business are orchestrated on the public stage like a symphonic masterwork.
The new alliance means IBM will be selling iPads, and Apple will be making room for IBM enterprise services. Sensible enough. But partnerships require communication, and only one of these two is good with that.
Now a company can give its employees the ability to provision themselves on the company's choice of cloud platforms, all within the mandates and guidelines set by IT in advance.
Neither Canada's nor the U.S.' attempt to foster new wireless competition from the sale of AWS-3 frequencies ever amounted to much. What's the Canadian for, "Try, try again?"
Network access providers should be disallowed from using DPI, and should provide regular reports to demonstrate they're not, suggests yet another group of Internet technology leaders.
How often would you let yourself be robbed every single day your business is open, until you decided it might be a good idea to shut the door to the vault?
As every mobile operator knows, when an app becomes available to a customer up front, its adoption soars dramatically. Now AvePoint has captured prime real estate with Rackspace without being acquired by it.