Virtualization has killed legacy IT's security by obscurity. Hence, NFV requires an even greater foundation in cybersecurity fundamentals than networks of old once did. Part 1 of a Telco Transformation Q&A with BT compliance exec and ETSI NFV Security Group vice chair Alex Leadbeater. October 2017.
An analysis of and update on the CRISPR/Cas9-patent landscape, published hours before the Broad Institute's response brief in the federal appeals court for the D.C. Circuit. October 25, 2017.
Bold comments made at the 2017 Bio-IT World Conference & Expo proposing a laxer "alternative security model" for life-science clinical research bear reexamination after a devastating proof of concept demonstrating that genomic files can carry malicious payloads. September 2017.
My scoop on Level 3's expansions of its Adaptive Network Security offerings in APAC locales as well as in Johannesburg, as well as planned global expansions—particularly in LATAM. October 2, 2017.
In the conclusion of this two-part Telco Transformation Q&A, Verizon's Fred Oliveira talks NFV standards, use cases, and automation—focusing on the context of the orchestration challenges of NFV.
Joan Triay, chairman of the NFV Technical Steering Committee at the European Telecommunications Standards Institute (ETSI), and I talk best practices for moving forward with and evaluating NFV efforts (including NFV automation). Conclusion of a two-part Q&A for Telco Transformation. September 2017.
Level 3's Travis Ewert and I talk about the problems of hype and heroism in NFV. Part 1 of a 2-part Q&A for Telco Transformation. September 2017.
Level 3's Adam Saenger and I talk about best practices for and barriers to both getting started with new SDN deployment initiatives and reevaluating existing ones. Conclusion of a 3-part Q&A series for Telco Transformation. August 2017.
A Q&A with NTT Communications cloud-solutions marketer Rui Okoshi on how her company's approach to enterprise digital transformation. Coverage from Boston's OpenStack Summit 2017.
The efforts and expertise of legal and compliance teams are essential to good enterprise information security and data protection. August 2017.
Using examples that span the length of the hit series, I offer 5 real-life lessons that IT leaders can draw from how characters from HBO's "Game of Thrones" handle life-or-death situations and suggest how they can apply their lessons to their own IT organizations. August 2017.
Ian Hood, of Red Hat, and I continue our SD-WAN conversation to examine the architectural and security challenges of SD-WAN—particularly in the context of Big Video. Part 2 of a 4-Part Q&A series for Telco Transformation. July 2017.
In Part 2 of this 3-part Q&A for Telco Transformation, Verizon exec Shawn Hakl and our continue our virtualization discussion to delve into the past, present, and future of SD-WAN and virtualization-enabled intelligent networks. July 2017.
In Part 2 of this Telco Transformation Q&A, Sky Italia's Davide Gandino and I talk about trends in and drivers of OTT video platforms and content, the role of AI in OTT, and how OTT has become an anti-churn "loss leader" of sorts among Sky Italia's offerings. Coverage from the 2017 Red Hat Summit.
In Part 1 of this 2-part Telco Transformation Q&A, Level 3 CTO Andrew Dugan and I talk about SD-WAN and MPLS, the networking market, and how Level 3's recently-announced SD-WAN product will impact the market as a whole while complementing other solutions. June 2017.
Devin Davis, Head of Marketing at the Cloud Foundry Foundation, and I talk about colocation, open-source multi-cloud, and the cloud impact of video content delivery in Part 2 of this 2-part Telco Transformation Q&A. Coverage from OpenStack Summit 2017.
In Part 2 of this 2-part Telco Transformation Q&A, CenturyLink's Gahn Lane and I talk about how the gaming industry is driving both AI tech and Big Video technologies like augmented reality (AR) and virtual reality (VR) in both B2C and B2B. Coverage from Red Hat Summit 2017.
Sky Italia OTT exec Davide Gandino and I talk about the roles of mobility, UX, virtualization, network efficiency, and OpenShift in Sky Italia's OTT platforms and VoD. Part 1 of 2 of a Telco Transformation Q&A. Coverage from Red Hat Summit 2017.
A broad overview of the BioTeam "Trends from the Trenches" panel at Bio-IT World Conference & Expo 2017, covering hyperconvergence, cloud computing, storage, data management, information security, and life-science IT leadership.
Coverage from and insights on Rommie Amaro's opening plenary keynote at the 2017 Bio-IT World Conference & Expo.
In Part 2 of this Telco Transformation Q&A, StoryUp VR CEO Sarah Hill and I talk about enabling VR adoption and lowering the barriers to entry. May 2017.
When it comes to web content and web design, UX (user experience) is the new relevance. Coverage from the 2017 Content Marketing Conference.
In Part 2 of this Telco Transformation Q&A, Viacom 18 Group CEO Sudhanshu Vats talk about examples of high-tech video transformation already happening or about to happen in India driven by AR, VR, AI, and Big Data analytics. Coverage from the 2017 MIT India Conference.
Increasing viewer demand for pipe- and screen-agnostic content has been driving OTT adoption in India. Part 1 of 2 of my Telco Transformation Q&A with Sudhanshu Vats, Group CEO of Viacom18. Coverage from the 2017 MIT India Conference.
Account-Based Marketing (ABM) isn't just for your most strategic existing accounts; it can also be applied to hunt that "whale account" that you've had your eye on. My take for DMN on the conjunction of ABM and what I call "Ahab Marketing". April 2017.
Open-source cloud enablement in the enterprise isn't just about open source. It's about taking disparate parts—including proprietary ones—and making a cohesive, efficient, effective networking whole. Part 1 of a Telco Transformation Q&A with the Linux Foundation's Arpit Joshipura. March 2017.
An examination of how to identify accounts that are appropriate for an ABM Lite approach—and how to identify and create target "clusters" of accounts, accordingly. Part 2 of a 2-part report for DMN about ABM Lite. March 2017.
In the Part 1 of this Q&A series for Telco Transformation, AT&T lead systems architect Doug Nassaur shares with me details on AT&T's philosophies and strategies related to open containerization. February 2017.
An overview of a handful of gene-editing alternatives and complements to CRISPR/Cas9. February 2017.
Level 3 exec Chris McReynolds shares his insights on maintaining visibility of network usage in the cloud -- particularly with the help of virtualization technologies -- in the first part of an interview series with Telco Transformation. January 2017.
Smart Cities? Yawn. Soooo 2015. For Verizon, the public-sector IoT vertical is all about "Smart Communities." In the first of a three-part interview series for Telco Transformation, Verizon IoT executive Daniel Feldman explains the difference between the two. January 2017.
OUT: "Threat sharing." IN: "Collaborative Defense." Top InfoSec brass weigh in on achieving a 360-degree view on cybersecurity. Coverage from the 2016 Advanced Cyber Security Center annual conference.
Coverage from ITSMA Marketing Vision 2016 highlighting the need for collaborative teamwork between marketers and salespeople to make account-based marketing (ABM) successful -- specifically, by integrating marketing's ABM plan with the sales team's account plans. The second of two reports.
Marketers may think they're naturally "above" sales teams, but effective marketing can't happen without proper sales enablement, good communication, and teamwork. Coverage from ITSMA Marketing Vision 2016.
In the 2nd of this 2-part Telco Transformation Q&A, Level 3 Communications CMO Anthony Christie explains how and why "[w]e eat our own cooking" when it comes to Level 3's use of internal productive video -- and how it contributes to DevOps and other operational functions. November 2016.
Cloud, IoT, and AR will combine to make a more efficient "smart laboratory" of the future. Coverage from the Pistoia Alliance's 2016 US conference.
Part Two of a three-part Telco Transformation Q&A with Rick Hubbard, Senior Vice President of Networking Product Management for AT&T Mobile & Business Solutions. Discussed: More AT&T SDN strategy, virtualization security FUD, and virtualization's role in the scalable platform economy. Oct. 2016.
A dubious look at studies claiming that a lack of mobile engagement is the biggest problem retailers face. October 2016.
A look at some of AT&T's low-power connectivity moves, when it comes to IoT. October 2016.
In what is reported the first study of marketing-creation costs, Percolate claims that marketing departments spend too much money on their creative and analytics. September 2016.
In Part 2 of 2 in this series for eSecurity Planet, threat-risk models Trike (CRUD) , MIL-STD-882E, and OCTAVE are compared and contrasted with each other -- as well as those threat-risk models highlighted in Part 1 (STRIDE, DREAD, and CVSS). September 2016.
An Aristotelian feature highlighting the tragic flaws of the DNC, TJX, and "cybersecurity advisor" Joseph Black. September 2016.
An examination of how AT&T presently claims to prioritize vertical markets for its IoT solutions -- juxtaposed against earlier, conflicting claims. September 2016.
A Telco Transformation Q&A with Mobeen Khan, Assistant Vice President of Strategy and Product Management for AT&T IoT Solutions, on AT&T's IoT connectivity plans. August 2016.
Data management, when fueled by predictive analytics, is a marketing power tool. Coverage from the 2016 MIT Sloan CDOIQ Symposium.
Collaboration -- even when people don't want it -- is the name of the game for Chief Data Officers in healthcare and the life sciences. Coverage from the 2016 MIT Sloan CDOIQ Symposium. My first article for Clinical Informatics News.
When Seven Bridges Genomics was the only commercial entity to win an NIH grant to build its Cancer Genomics Cloud, the Cambridge, Massachusetts, startup had truly arrived. July 2016.
Food for thought as Capitol Hill cyberhawks attempt to wage a cold war on encryption. July 2016.
An in-depth preview of Verizon Marketplace -- an app store coming soon to Verizon ThingSpace, the telco's IoT DevOps platform. June 2016.
The IoT revolution has fueled greater DevOps accessibility. Coverage from the Massachusetts Technology Leadership Council's 2016 Internet of Things Conference.
A seeming post-mortem on both obvious and latent problems in the proposed -- and subsequently sidelined -- Compliance with Court Orders Act of 2016. June 2016.
The 2016 Summer Olympics have presented an opportunity for marketers to identify how to best "translate" their marketing and social media efforts -- both linguistically and culturally. May 2016.
Security insights on virtualization, the cloud, and big-data analytics in the healthtech and life-sciences space.
Coverage from an April 28 "lunch and learn" presentation on recurring-revenue business models.
Coverage of an April 2016 webinar on cloud-based business models, in which cloud consultant Jeff Kaplan announced the death of traditional market-leader wisdom.
As video grows more important, so too do training and best practices for video webcasts. April 2016.
A highlights feature on est practices in authentication. Coverage of the February 2016 meeting of the National Association of Information Security Guild (NAISG), Boston chapter.
An overview of Iterable's comparative analysis of digital user engagement between campaigns in the 2016 Presidential Election. March 2016.
An IHS study indicates that downtime events at midsize companies cost, on average, $1 million a pop -- while at large enterprises, they average $60 million per. My overview on the causes and how to reduce downtime risk. January 2016.
Do CIOs have inherent conflicts of interest with CISOs? To whom should the CISO ultimately answer? (This InformationWeek coverage of the 2015 MIT Sloan CIO Symposium has been influential in changing the CIO and CISO chain of command within the US Department of Health and Human Services.)
In this Star Wars Day (2015) special for The New IP, satellite-based connectivity for Sigfox's LPWAN promises wonders for IoT deployment that are out of this world.
April 2015 InformationWeek slideshow highlighting DARPA's Plan X -- and its aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
Microsoft's hype of its upcoming biometrics system in Windows 10, spouting the virtues of biometrics over traditional password-based security, seems misguided at best -- misleading at worst. Part 1 of a 3-part series for InformationWeek on the trouble with biometrics.
Part of 1 of 2 highlighting the benefits of unikernels. April 2015.
As part of InformationWeek's National Robotics Week 2015 coverage, this slideshow offers some good reasons to doubt the robot apocalypse.
Considerations for ISVs and OEMs, and other enterprises as cloud computing lowers barriers to entry. Coverage from Boston's invitation-only Oracle Cloud Roadshow in February 2015.
Increasing coverage of Adobe Flash's endless vulnerabilities indicate that this ubiquitous and constantly exploited software may be on its way out. March 2015.
The Clintonemail.com brouhaha presents important Shadow IT lessons for the enterprise. March 2015.
Virtualization and whiteboxing are hot -- but they still don't exactly spell extinction for proprietary hardware. March 2015.
In this February 26, 2015, piece -- published the same day as the FCC's "Net Neutrality" vote -- I make clear that the day's FCC vote is but the first step along a long legal row to hoe to make Commissioner Tom Wheeler's dreams come true.
A look at the legal and regulatory problems Anthem could face in the wake of the major hack that compromised its customers. February 2015.
In this slideshow, I highlight some suggestions for thoughtfulness at the workplace that the boss might appreciate. A pre-Valentine's Day 2015 special for InformationWeek.
A slideshow overview of expected legal arguments against the FCC Chairman Tom Wheeler's then-proposed "Net Neutrality" regulations -- and how those arguments might be expected to fare. February 2015.
In this bit of Monday-morning quarterbacking, I draw parallels between atrocities from the previous night's big game and atrocities regularly committed by the IT department.
The NIST Cybersecurity Framework is helpful (and sometimes even necessary) for InfoSec and compliance efforts -- but it's not the be-all and end-all. Coverage from two 11/14 Boston events: the NRS Technology & Communication Compliance Forum, and the annual Advanced Cyber Security Center conference.
Frameworks, welcoming hackers to the table, and getting individuals to openly collaborate on cybersecurity will improve cybersecurity. Coverage of two Boston events in 11/14: the NRS Technology & Communication Compliance Forum, and the Advanced Cyber Security Center annual conference.
"M&M security" (hard on the outside, soft in the middle) is all too common. Expect to have your outer layers breached, and plan from there. Coverage from two 11/14 events in Boston: the NRS Technology & Compliance Communication Forum, and the annual Advanced Cyber Security Center conference.
Electronic voting of any kind (let alone online voting) is all too easily hacked. An Election Day 2014 special for Enterprise Networking Planet.
As numerous, major security flaws in popular open-source software have come to light, the self-righteousness preaching that open-source is inherently more secure than proprietary software can no longer be blindly accepted. My award-winning op-ed for Enterprise Networking Planet. October 2014.
Speakers at Boston's Connected Cloud Summit (2014) indicate that some form of distributed mesh networking may be the ultimate answer for IoT ubiquity.
IT pros weigh in on this top-ten list of IT pet peeves for Enterprise Networking Planet. Part 3 of 4. August 2014.
Predicting "unplanned outages" was once the stuff of Dilbert jokes. Today, big-data analytics engines -- combined with effective collaboration -- makes it a reality. July 2014.
Cloud-based externalization in the healthcare and life-sciences sector has heightened the need for secure, cloud-based IAM solutions. Coverage from Bio-IT World Conference and Expo 2014.
Turnkey "cloud-in-a-box" on-prem machines offer a myriad of storage, infrastructure, and compliance benefits for the life-sciences sector -- and are still compatible with the actual cloud. Part 2 of 2. Coverage of Bio-IT World Conference and Expo 2014.
Malware known as "Careto" (or, "The Mask") went undetected for five years, quietly collecting sensitive information. How can enterprises guard against it -- and what else is out there?
An award-winning overview of basic need-to-knows for businesses considering cyber insurance. March 2014.
A Christmas 2013 parody that puts an IT twist on the Clement Clarke Moore classic.
On an electrical-engineering professor's efforts to bring Internet connectivity to the 70 percent of the world that's covered by water. November 2013.
Linguistic sentimental analysis of Congressional Twitter feeds conducted by poli-sci professor Adam Ramey reveals the degrees to which US legislators are likely to work together -- or obstruct each other. October 2013.
The much maligned password is still better than inherently flawed biometrics -- if for no other reason than the Fifth Amendment. October 2013.
Industry analysis from the hypervisor-market perspective on Citrix's donation of Xen to the Linux Foundation. May 2013.
Despite higher-level problems of accessibility, integration, search, and analysis, the biggest tech problem facing bioinformatics may be a storage problem. Coverage from Bio-IT World Conference 2012.
Want better data-science processes? Work backwards. February 2012.
Tips from an organizational expert on trading in respondent subjectivity for benchmarks in your surveys. October 2011.
Netflix-like customer-service surveys -- consisting of but one question -- miss the bigger picture. August 2011.
Despite what Europeans and big banks have to say, EMV is far from perfect. My first piece for Enterprise Efficiency. December 2011.