Observers called last month's Supreme Court decision against Aereo the "looks like a duck" argument. Now Aereo is not only owning that argument, it's turning it on its ear--if ducks have ears.
How effectively are the people in your organization communicating with one another? Perhaps--just perhaps--the answer can come from analyzing the patterns of that communication.
There may be less of a role for Windows Server in the data center than ever before. Ironically, what takes its place could very well bear Microsoft's trademark.
You know a new technology has evolved past the embryonic phase when three or more teams of tech players close ranks to decide how to make use of it.
It's called "social networking," not because it follows the principles of Marx and Engels, although many of its practitioners wish it did.
One of the least understood concepts in the net neutrality debate becomes the next political football.
It was a good go for a promising new technology, but alas, dozens of services outages and one or two bankruptcies doomed cloud computing at the starting gate. I know. I read it in the Times.
If someone steals your phone then logs onto your apps, those apps may think they're working with you. What if the connection between you and those apps could be severed first?
Can yesterday's certified communications skills translate into today's NFV skills? It depends on whether someone steps up to serve as a certification broker of sorts between the two skill sets.
Following the publication of a research study that revealed that Facebook conducted clandestine tests on its own users, Facebook Chief Operating Officer Sheryl Sandberg made a statement to reporters apologizing not for the study, but for the way people learned about it.
On its face, the U.S. Federal Trade Commission's formal complaint against T-Mobile last Tuesday alleges that the telco charged customers for unnamed data content provided by third parties, that those customers never consented to or more likely, never actually received. It goes on to allege that the carrier pocketed as much as 40 percent of those overcharges.
As Google begins its effort to comply with Europe's "right to be forgotten" law, more is now known about what's being forgotten than ever before.
In a refreshingly non-IBM-style move, the company is tying a lasso around all its collaboration services that want to, well, collaborate with each other, and is putting them all in one platform.
The identity assertion language that developers adopted for authentication just four years ago may already be outdated, says someone you'd think would be SAML's evangelist.
In a follow-up to a follow-up, the chief of a key InfiniBand working group says speed barriers were indeed broken, though it's important to know which ones.
The most ambitious municipal Wi-Fi platform in America to date is now 100% live. Now its capacity to survive an onslaught of negative publicity from telcos, will be tested.
If inventory systems become automated to the extent that they can track your purchases passively in real-time, is your privacy being violated?
During one week in 2012, nearly 700,000 Facebook users had their news feed content positively or negatively stimulated, and their responses to that stimulus were clinically monitored.
Last year, Oracle acquired one of the principal players in the session border controller space. This year, it's injecting that space with its IT-based vision of service orchestration.
A tweet-chat session between experts in authentication, some well-known journalists, and myself, reveals the role our own perception plays in the security problem.