News

What I mean by 'communications'

Every week, I get this question from someone at least once:  What's the difference between the "Telecom" in FierceTelecom and the "Communications" in FierceEnterpriseCommunications?

How would the Senate's revised surveillance bill impact governance?

The fact that Congress is considering an abstract concept to specify explicitly "identity" may open the door for private firms to do the same. But how could such a system identify people while maintaining privacy?

Spotlight: The meaning of 'public' in a world of privacy

Should the public's right to data be defined before the law starts interpreting "public data" as something to which everyone has a right?

Cloud orchestration platform Cloudify rethinks its entire purpose

An open source team that found itself competing with the very platform it tried to support amends its value proposition with an orchestration engine it hopes will keep up with OpenStack.

What 'Internet of Things' means today: production line visibility

Someplace beneath the marketing hype is the reality of what "Internet of Things" technology can actually do and it actually makes more sense than the hype itself.

Dropbox disabling links to possible PDF malware, reports Cyren

The distribution sources for potentially malicious documents are actively working to disable their distribution. But a Dropbox security alert seems to indicate that's making customers mad.

Sprint to resell Google Apps for Business, adding 24x7 support

Reviving a sales model that goes back to the 1980s, the reseller becomes the customer's point-of-presence for Google's SMB applications.

Dialogic SVP: How WebRTC could put an end to carriers' voice plans

Think about this for a moment: If your phone has an HTML5 browser, and that browser has WebRTC, then why do you need a phone number?

Cisco tries new collaboration, compliance tools for diverse work environments

How can the largest producer of collaboration appliances make collaboration work where appliances typically don't? Cisco engineers are tackling the problem before they're tackled by it.

Where do we plant the root of trust?

The problem of securing identity in a network of both mobile devices and clouds is only growing more complex.  A solution may require us to transcend what we think we know.

Ponemon: One-third of security professionals never talk with executives

The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.

Spotlight: They're not really 'back doors' if Apple gives them brass knockers

Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.

Open source ownCloud innovates unique collaboration scheme

It looks like an open source, on-premise implementation of Dropbox. Look closer, though, and you'll see a way to securely open up object stores on an OpenStack platform.

Road to 10 gigabits will hit big net neutrality hurdle

The way to implement higher bandwidth services on the way to 10gig involves the deployment of a quality-of-service management technique that net neutrality regulations might prohibit.

Spotlight: iOS 7 remains wide open to exploits, says researcher

Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads. 

Latest stage of net neutrality's war of the words ends with no victors

If a champion of the people was supposed to have emerged from the "public dialog" about how the Open Internet problem was to sort itself out, that champion was difficult to see for all the smoke.

Verizon tests the 100 Gigabit Ethernet network waters during recent field trial

Separated by 4.6 miles of fiber from the customer edge, a select customer exchanged Ethernet traffic with the telco over a 100GigE connection.

Ping takes a swing at replacing passwords with mobile devices

The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.

Netflix: Free speech shouldn't be a factor in 'commercially reasonable'

While some net neutrality advocates have elevated the issue to the level of a human rights debate, one advocate is suggesting it be deflated to that of a business arrangement.

Copyright Office: Supreme Court may say Aereo is a cable company, but it's not

Citing a 2011 Second Circuit decision that quotes the Copyright Office's own interpretation of the law, the Copyright Office holds fast to that interpretation, even though it directly contradicts the high court.