The Commission's chief lawyer and interpreter of the terminology behind regulations admits there may be benefits in re-interpreting the agents of the Internet the way Aereo would prefer.
"Workflow" sounds better than "itinerary," and that poetic lilt is important when trying to get your workforce on board with a tactical improvement program.
It was a small security conference, but I'll take it. It gives me time to listen to people in their everyday work whose business is suffering from a lack of healthy communication.
The tech press often waxes poetic about the latest clever, automated, exploit "bot." But a veteran security engineer uses the oldest tricks in the book to prove you don't need bots to take down a network.
Already, people are happy to give away elements of their personal data to private industries for marketing purposes. Why does the U.S. Government bother with eavesdropping for the same data?
A man carrying a double-edged lightning bolt (insert appropriate ironic symbology here) attempted to upstage Salesforce CEO Marc Benioff with a 25-year-old idea. And he might have succeeded.
This week's Dreamforce 2014 kicked off with a Microsoft announcement. That fact alone reveals how dominant Salesforce has become in recent months.
It was the announcement that absolutely everyone knew ahead of time, but some of the real advancements in Salesforce's new Wave platform still remained surprises.
Why exactly are we blaming employees for doing what they need to do to get work done?
The depersonalized nature of electronic connections has created a situation where people with the capability to lead are reluctant to try, said the former Secretary of State and former presidential candidate.
Bloggers acting on public information do have a tendency to get the facts wrong. But Dropbox's effort to correct them, spearheaded by someone other than its PR team, pointed to some uglier facts.
It remains the video systems squabble that could impact the structure of the whole Internet, even when it seemed the former personal antenna service provider had already lost.
My friend and former colleague Wolfgang Gruener has gone on to become a professional content strategist, which is like a technologist who produces material that people read as opposed to material people use. Here's what he has to say.
The idea that any one search engine should be charged with the task of facilitating individuals' rights of censorship, sounds absurd enough. But Tim Berners-Lee's alternative doesn't sound much better.
One of the main complaints about pre-loading business smartphones with mobile productivity apps has been addressed, with an option that moves authentication inside the corporate network.
It's an amazing new system that utilizes multiple antennas to steer transmissions between broadband modems, TVs, PCs and smartphones. Haven't we done this story before? Nah, let's lead with it anyway.
If the Federal Trade Commission fails to take visible steps toward enforcing privacy policies on European citizens' data stored on U.S. servers, storing it there in the first place could become illegal.
It may very well be a supremely useful automation tool for the emerging field of data scientists who need to test mathematical models without building them manually. But that's not the message its vendor is sending.
If your organization plans to spend months whiteboarding the response patterns for support desk agents responding to customer incidents, be advised, you might want to rethink your plans.
If security bugs like last month's Xen hypervisor vulnerability continue to be mitigated with minimal damage, and disaster totally avoided, will there be anything left to panic about?