• Home
  • About IPG
    • A Statement of Gratitude
    • The Care and Feeding of Editors
    • The Care and Feeding of the Press
    • Commentary
      • IPG to Forbes Magazine: Wake Up, People
  • IPG Members
    • Member List
    • Membership Requirements
    • Mailing Lists
    • In Memoriam
  • Recommended Reading
  • Member Login



Joe Stanganelli
Attorney. Consultant. Writer. Speaker. Bridge-player.

Contact Info

 LinkedIn
 Twitter

Member Profile Editor

Edit Member Details
This information is only visible to the currently logged-in member.
Edit Member Photo
This information is only visible to the currently logged-in member.
Edit Contact Info
This information is only visible to the currently logged-in member.
Edit Official Bio
This information is only visible to the currently logged-in member.
Edit Social Info
This information is only visible to the currently logged-in member.
Edit Recommended Links
This information is only visible to the currently logged-in member.
Manage Profile Articles
This information is only visible to the currently logged-in member.

Featured Work

Red Hat's Jordan-Smith: Digital Transformation Happens at the Mobile Edge
In Part 1 of another Telco Transformation Q&A series with Red Hat's Darrell Jordan-Smith, we discuss Red Hat's role as matchmaker when it comes to "digital transformation by proxy" when it comes to its network-operator customers' customers—and the power of the mobile edge thereby. November 2017.
Will AI Make Account-Based Marketing Obsolete?
A look at how AI can enhance—and possibly overtake—ABM. Coverage from ITSMA Marketing Vision 2017.
Uber Loses Customer Data; Customers Yawn & Keep Riding
Uber covered up its Oct. '16 breach, but it's already built up a long list of big-time data-protection sins. But riders are still riding and drivers are still driving—and InfoSec professionals should learn something from this fact. November 2017.
Common Sense Means Rethinking NIST Password Rules
As cybersecurity professionals increasingly recognize that InfoSec doesn't happen in a vacuum, NIST has finally begun urging against overly burdensome password requirements. November 2017.

Official Bio

Joe Stanganelli has been principal of Beacon Hill Law, a Boston-based law firm, since 2008.  As an attorney and business consultant, his practice areas include matters of employment law and compliance issues related to corporate communications, cyber liability, and data privacy.

Joe is also a writer, speaker, and bridge player.  Joe has written hundreds of articles and blogs on technology, analytics, and marketing topics for several outlets; sometimes people other than his mom actually read them.  None of anything Joe says or writes is legal advice unless he sends you a bill, and maybe not even then.

Joe has been working with social media since before the term “social media” was invented; he does not consider himself a “guru.”  He has also worked as a professional actor, director, producer, playwright, box-office assistant, and dishwasher.  He enjoys spending time with his zero cats.

Follow Joe on Twitter at @JoeStanganelli, where he also does not give legal advice. 

Follow This Member

 

Recommended Links

 IPG Home Page

Report Site Issue

If you find a bug or a serious issue with this site, please post a detailed report. Thanks!
Post Bug Report

More From Joe Stanganelli

GDPR: Broad, Complex & Coming Soon
GDPR -- looming ever closer -- was supposedly intended to make data-protection regulation simpler in the EU. So much for that. Includes coverage from an October 31, 2017, MassTLC event.
Verizon's Ritter: SDN/NFV Security Demands Cross Checks
Virtualized network or no, the basics are of cybersecurity are still the basics; diligence is still demanded for network architects, orchestrators, and engineers. Verizon's Phil Ritter and I discuss in the conclusion of this two-part Q&A for Telco Transformation. October 2017.
Twitter Doubles Up: How Will 280-Character Tweets Impact Brands?
As Twitter takes the path to plus-sized tweets, brands should beware—and continue to tread lightly with tweets. October 2017.
Level 3's Richter on Cloud Security Evolution
Broadening our discussion on cloud-based security in Part 2 of this Telco Transformation Q&A, Level 3's Chris Richter and I talk about how compliance needs, SD-WAN, and globalized customer demand for proximity have driven the evolution of Level 3's Adaptive Network Security offering. October 2017.
Inbound ABM Is a Thing
Coverage from INBOUND 2017 focusing on a presentation by Cybereason marketer Patrick Shea's presentation—in which Shea talked about his own experiences merging traditional inbound-marketing methodologies with the more modern and personalized sensibilities of account-based marketing.
Verizon's Oliveira: NFV Needs Orchestration, Openness
In Part 1 of this 2-part September 2017 Telco Transformation Q&A, Verizon's Fred Oliveira gives an overview of the telco's work at the then recent ETSI NFV plenary meeting as well as what he was expecting from the then upcoming NFV and Carrier SDN Light Reading event (at which he was keynoting).
Level 3's Ewert: Why Automation Is a Boon to Employees
Level 3's Travis Ewert and I talk tech-talent demands in the age of NFV-driven automation, how NFV-driven automation can improve both employees' actual work demands and the job market, and the fallacy of tech's "talent shortage". Conclusion of a two-part Q&A for Telco Transformation. September 2017.
OPNFV's Kirksey: Open Source Network Automation – Virtual, Yet Human
Open-source NFV efforts drive collaborative agility, according to OPNFV's Heather Kirksey. Coverage from an August 30, 2017, Light Reading UpskillU presentation.
Level 3's Saenger: SDN a Gateway to Automation
Continuing our SDN discussion, Adam Saenger of Level 3 and I talk about the impact of the demands of the various VNF markets on the SDN space—particularly where network orchestration and related areas are concerned. Part 2 of a 3-part Q&A for Telco Transformation. August 2017.
Level 3 Serves Up Scalable Ethernet Feature for AWS
My scoop on the release of eLynk—a scalable, self-service Ethernet feature from Level 3 Communications for AWS—and how Level 3 is prioritizing its cloud offerings (i.e., first AWS, then Microsoft Azure). August 23, 2017.
OCP's Carter: Open-Source Agility Begets Web-Scale Agility
Open-source disaggregation is helping telcos and network carriers become more agile with web-scale IT, says the Open Compute Foundation's CTO, Bill Carter, in the conclusion of this 2-part Q&A series for Telco Transformation. August 2017.
Red Hat's Hood on Web-Scale IT's Impact on IoT & 5G
Wrapping up our discussion on software-defined networking and web scalability, Red Hat's Ian Hood and I examine how web-scale IT enhances LTE-network efficiency—better enabling the 5G future and the IoT "Smart Cities" vision. Conclusion of a 4-Part Q&A series for Telco Transformation. August 2017.
Red Hat's Hood on Perpetuating SD-WAN Success
Along with some of an overview of some of Red Hat's SD-WAN projects, Red Hat's Ian Hood and I talk some SD-WAN basics—and poke and prod at the idea of how broadband providers might leverage network effects to improve their services. Part 1 of a 4-Part Q&A series for Telco Transformation. July 2017.
Verizon's Hakl: SD-WAN Delivers a Multitude of Benefits
In Part 1 of this 3-part Q&A for Telco Transformation, Verizon's Shawn Hakl and I talk about the multitude of agility benefits SD-WAN can bring to telcos. July 2017.
3 Tips for Cost-Effectively Managing LinkedIn Ads
LinkedIn Ads can get costly quickly. Here are three tips for keeping those costs relatively low and maximizing ROI all the while. Coverage from University of Massachusetts—Boston's 6th annual Social Media Day and a June 2017 Hannapin Marketing webinar.
Level 3 Launches Premises-Based SD-WAN
On January 20, 2017, Level 3 Communications announced Level 3 SD-WAN—the network operator's first pure-play, on-prem SD-WAN product. My coverage for Telco Transformation, with original quotes from Level 3 CTO Andrew Dugan and Level 3 CMO Anthony Christie.
OCP's Carter Gets Real on Open Hardware
In Part 2 of this 2-part Telco Transformation Q&A, Open Compute Project CTO Bill Carter and I talk about the real-world impact of the open-network vision. Coverage from OpenStack Summit 2017.
Carter: OCP Seeks to Broaden Reach at OpenStack
The open-software movement and the open-hardware movement come together in disaggregation. In Part 1 of this 2-part Telco Transformation Q&A, Bill Carter, CTO of the Open Compute Project, talk about the open-*network* movement. Coverage from OpenStack Summit 2017.
CenturyLink's Lane on Open Standards Risks in Big Data
Open source and open standards are great, but are they right for you? Maybe—but that depends upon your perceived-risk tolerance. Part 1 of 2 of a Telco Transformation Q&A with Gahn Lane, CenturyLink's Vice President of Software Alliances. Coverage from Red Hat Summit 2017.
At Bio-IT World, CIOs Talk Technology, Talent, And Threats
In a plenary keynote panel session, four life-science CIOs from varied backgrounds dished on the latest tech trends they've been faced with. Coverage from Bio-IT World Conference & Expo 2017.
Level 3's Saenger: Virtualized Cloud Binds AI, Big Data
In Part 2 of this two-part Telco Transformation Q&A, Level 3's Adam Saenger and I delve into the intersection of enterprise cloud and AI. June 2017.
Level 3's Richter: Simplicity Strengthens Security in the Enterprise Cloud
In the 2nd part of this Telco Transformation Q&A with Level 3's Chris Richter, we discuss enterprise-cloud security and complexity perspectives as well as CIOs who feel like they're "faking it" with their data.
StoryUp's Hill on Healing With Holograms
Part 1 of my Telco Transformation Q&A with StoryUp CEO Sarah Hill. Discussed: How immersive media solutions like VR, AR, and MR drive emotions and how the brain functions. Coverage from the 2017 Content Marketing Conference.
For AT&T, Cultural Transformation Begets Digital Data Transformation
My overview of Light Reading's UpSkill U lecture from April 19, 2017, in which AT&T associate director of technology Sarah Obermayer discussed building and maintaining centralized analytics initiatives.
Red Hat's Jordan-Smith: Many Eyeballs on the Cloud
In this Telco Transformation Q&A, Red Hat's Darrell Jordan-Smith discusses with me OpenStack and the importance of open source and open standards to enterprise cloud—going so far as to say that open source "out-innovates proprietary-based platforms [like] VMware". April 2017.
Level 3's Richter Talks About Enterprise Cloud 'Gotchas'
In Part 1 of this Telco Transformation Q&A, Level 3's Chris Richter and I talk stupid users, zero-day vulnerabilities, not-so-apparent SLA cost trade-offs, and other enterprise-cloud "gotchas". March 2017.
How Not to Do Browsewrap: A Parable
The recently decided Vitacost.com, Inc. v. McCants case puts additional perspective on the dos and don'ts of browsewrap. An ecommerce week special case update for DMN. March 2017.
ABM & Cluster Marketing, Part I: Try ABM Lite
Overwhelmed by the strict one-to-one approach of Account-Based Marketing? Part 1 of this 2-part report for DMN examines some of the benefits of cluster marketing—a.k.a. ABM Lite. March 2017.
Better Wrong Than Late? The Content Marketing Balancing Act
When it comes to content marketing, is it better to sacrifice accuracy for the sake of speed? Or vice versa? Or to balance the two? February 2017.
There's More to Video Views than Meets the Eye
Facebook-standard 3-second video views have their place in marketing. Sightly, though, has staked its video-performance business model on the notion that meaningfully positive ROI from video ads generally requires 10 times that view length—especially if you're a local or regional brand. Feb. 2017.
Feldman: Verizon Constructs Smart Communities on Deals, New Tools
Verizon's acquisitions portfolio is a key driver of the telco's "Smart Communities" approach to Smart Cities IoT. Conclusion of a three-part interview with Verizon IoT exec Daniel Feldman. January 2017.
Interference: A CRISPR Patent Dispute Roadmap
A "connect-the-dots" guide to ongoing CRISPR/Cas9 patent litigation, highlighting the billions of dollars at stake for corporations, universities, and clinical researchers. January 2017.
CRISPR Tech Heralds Hype, Hope, and Hurdles for Gene-Based Therapeutics
(Or: How to Cure Cancer and AIDS with This One Weird Trick). A "State of the Union" overview of the scientific and marketing opportunities -- and obstacles -- that face CRISPR/Cas9 gene-editing technology. December 2016.
3 Keys to ABM Success
A highlight of three core takeaways on account-based marketing (ABM) success from ITSMA Marketing Vision 2016. The first of two reports.
3 Essential KPIs for Demand Creation Efficiency
Almost no marketers are succeeding at efficient demand generation -- or are even attempting to measure it properly. These three "core" KPIs can help. Coverage from ITSMA Marketing Vision 2016.
Level 3's Christie Talks Internal Video & Telepresence Training
In the 1st of this 2-part Telco Transformation Q&A, Level 3 Communications CMO Anthony Christie defines the difference between "videoconferencing" and "telepresence," why that distinction is important, and how Level 3 leverages it internally for organizational messaging. October 2016.
LATAM Region a Leader in Virtualized Cloud
LATAM nations appear to be leading the world in digital-transformation technology deployment. October 2016.
Hubbard Talks AT&T's SDN Strategy
Part One of a three-part Telco Transformation Q&A with Rick Hubbard, Senior Vice President of Networking Product Management for AT&T Mobile & Business Solutions -- looking at AT&T's SDN strategy. October 2016.
3 Ways CISOs Can Partner with Chief Data Officers
Typical as it may seem for the CDO's office and the CISO's office to fight like cats and dogs. This coverage from the 2016 MIT Sloan CDOIQ Symposium offers three tips on how CDOs and CISOs can act less like Garfield and Odie and more like Milo and Otis.
NGS-Based Diagnostics Out of the Dark Ages with GATK
Having brought Next-Generation Sequencing out of the dark ages relatively quickly with a massive, open-source(ish) platform, the Broad Institute's GATK still bears a strong reputation for accuracy in the scientific community. Part 2 of 2 of a point-counterpoint series for Diagnostics World.
Taking Care of Our Own: HR in the Age of Genomics
A Bio-IT World feature on genomics organizations that do -- and don't -- put their money where their mouths are when it comes to subsidizing genetic sequencing tests for their employees. September 2016.
Which Threat Risk Model Is Right for Your Organization?
Threat-risk models STRIDE, DREAD, and CVSS are outlined and compared. Part 1 of 2 in a series for eSecurity Planet.
Cisco v. Arista: The Patent Battle Analyzed
A lawyer's-eye view of the past, present, and future of the patent wars between Cisco and Arista. September 2016.
BSS/OSS: Level 3's Ewert Urges Cloud Centricity for Better Systems
A Telco Transformation Q&A with Travis Ewert, Senior Vice President of Global Network Software Development for Level 3 Communications, on how "cloud centricity" is the key to updating legacy BSS and OSS. September 2016.
Is Data Governance the CDO's Responsibility?
Data governance: Whose job is it anyway? Specifically, is it the Chief Data Officer's job -- just because "data" is in the job title? Pundits -- and CDOs themselves -- disagree. Coverage from the 2016 MIT Sloan CDOIQ Symposium.
Curbing Human Trafficking with Analytics
Dun & Bradstreet's nascent Human Trafficking Risk Index is helping companies be compliant and responsible when it comes to keeping slavery and other abusive labor practices out of their supply chain. July 2016.
Verizon: Ag Ripe for the Picking with IoT
Agricultural technology (Ag Tech) is a rapidly growing -- ahem -- *field* when it comes to IoT enablement. For Verizon, Ag Tech is thus far the telco's IoT crown jewel. July 2016.
Intel's Cancer Cloud: Complementing NCI Collaboration
Intel's failure to get a coveted NIH grant for building a cloud for genomic cancer-research data hasn't stopped the tech powerhouse from entering the fray regardless. July 2016.
Marketing and Sales Need Data on Tap (DaaS)
Coverage from the 2016 MIT Sloan CDOIQ Symposium, featuring Symposium speaker and Reltio CMO Ramon Chen's analysis of the importance of DaaS -- Data as a Service.
Exclusive: Verizon Beefs Up ThingSpace With Big Data & App Store
June 23, 2016: My exclusive scoop breaking news that Verizon will infuse both its Big-Data analytics engine and an app store into its IoT DevOps platform, ThingSpace.
Smart Lights + Smart Traffic = Smarter Cities
Coverage of a Smart Cities breakout panel session at the Massachusetts Technology Leadership Council's 2016 Internet of Things Conference.
IoT at MIT CIO Symposium, Part 2: IoT's Unholy Trinity
IoT innovation and development faces three major perennial problems: information security, data privacy, and regulatory compliance. Coverage from the 2016 MIT Sloan CIO Symposium.
Verizon Fiber Rollout Will Make Boston a 'Smahter' City
Verizon's six-year fiber rollout project in Boston will contribute substantially to the Hub's "Smart City" initiatives. May 2016.
Rio Olympics: Winning Social Gold
Takeaways from a consumer-behavior study prognosticating viewership behavior associated with the then upcoming 2016 Summer Olympics. May 2016.
National Security Letters and Gag Orders: 5 Tips to Reduce Risk
This award-winning feature for eSecurity Planet presents tips for IT organizations wishing to proactively defend against gag-ordered demands for information. May 2016.
Facebook: Marketers Should Mobile-Optimize Their Video Content
As mobile video's importance grows increasingly obvious, Facebook and others have begun actively advising customers on how best to engage with their users via mobile video.
Clean Your Data with Visualization and Algorithmic Tests
Tips for data scientists on filtering background noise, bias, and "false peaks" out of data analysis. Coverage from Boston's 2016 Bio-IT World Expo.
Seven Leaders in Video Advertising
An overview of G2 Crowd's rankings of seven video-advertising companies. March 2016.
Next-Generation Firewalls Put to the Test
My overview of the highlights from third-party testing of 13 popular NGFWs. March 2016.
Microsoft Wants to Fix Cloud Security's 'Trust Problem'
An June 2015 overview of then nascent cloud-computing security projects from Microsoft Research that could be revolutionary.
EPC and the Virtualization Impact
Operators and service providers can solve the efficiency and outage problems of provisioning extremes with vEPC (virtualized evolved packet core) technology. May 2015.
4 Data Security Mistakes You Can't Afford
Email, the cloud, cyber liability, and Shadow IT all present costly -- yet relatively easily mitigated -- dangers for small businesses. April 2015. My first for Small Business Computing.
Bypassing the Password, Part 3: Freedom Compromised
Want to protect your privacy from government snoops? Say no to biometrics. Say yes to strong password protection and encryption. The conclusion of a 3-part series for InformationWeek on the trouble with biometrics.
5 Cyberwar Threats Worth Watching
An InformationWeek slideshow featuring five nation-states that, as of its April 2015 publication, have represented major cyberthreats to the interests of the US and its allies.
Robot Villains: What They Teach Us
Three lessons from fictional robot villains that we can apply to real life to stave off the robot apocalypse. This slideshow was part of InformationWeek's National Robotics Week 2015 coverage.
4 Video Games Every Office Should Play Together
Recommendations of four video games that have shown demonstrable productivity and other benefits in the workplace. An April 2015 InformationWeek slideshow.
The New IP Under the Sea
Updates on professor Tommaso Melodia's underwater Internet projects. April 2015.
Opinion: The FTC's IoT Power Grab
The FTC's IoT report purports to make proposals in the interests of information security and privacy greater goods, but a closer look reveals it to be just an artless political power grab for the regulatory agency.
Clinton Email Fail: Worst Government Security Flubs
Hillary Clinton isn't the first US politician to commit a major email faux pas. This InformationWeek slideshow highlights a few others -- and the lessons IT departments can learn therefrom. March 2015.
Warrant Canaries: Watching US Agencies So IT Doesn't Have To
Activists want to make warrant canaries more ubiquitous and more regularly monitored, but will they ultimately be effective? March 2015.
4 DARPA Projects We Love
This February 2015 slideshow for InformationWeek highlights some of the latest and greatest tech developments to come out of DARPA.
4 Hot Mobile Banking Security Developments
Security is often the biggest barrier to getting people on board with mobile banking. With these four new security developments highlighted in this slideshow, the sell should be a little easier. February 2015. My first piece for Bank Systems & Technology.
Anthem Hack: Lessons for IT Leaders
What other IT managers can learn from Anthem's mistakes. February 2015.
Frivolous Devices Dim IoT Vision & Promise
Many IoT makers and marketers are focusing on the wrong things. February 2015.
Seeking the IoT Vision
Three examples of a nascent trend in IoT -- "Findables" -- are featured. December 2014.
Michael Chertoff Examines the Anatomy of Cybersecurity
Coverage of Michael Chertoff's keynote address at the 2014 Advanced Cyber Security Center annual conference.
Securing Open Source
Open source isn't as secure as the Stallman fundamentalists have been telling us. All is not lost, however; the security of open source can be readily improved. December 2014.
The Internet of Things: 3 Security Requirements
IoT devices are as easily hackable as anything else Internet-connected. Here are three critical strategic considerations for IoT cybersecurity. Coverage from Boston Connected Cloud Summit 2014.
A Killer App
You've heard of wearables and ingestibles -- but how about murderables? The Internet of Things means the Internet of Things That Can Be Used to Kill You. A Halloween 2014 special for The New IP.
Infinite Data & the Systems Age
The Information Age is over; data has become a cheap commodity. We have now entered the Systems Age -- a critical time in our techno-evolution. Coverage of Boston's Connected Cloud Summit 2014. My first piece for The New IP.
If You Want IoT, You Need the Cloud
Only the cloud can make it rain for IoT deployment. Coverage of Boston's Connected Cloud Summit, 2014.
Disorganized Datacenters and Bad GUI: Top 10 IT Pet Peeves, Part 2
IT pros weigh in on this top-ten list of IT pet peeves for Enterprise Networking Planet. Part 2 of 4. August 2014.
3 Tips for Tackling Big-Data Collaboration
Big Data analytic efforts are unwieldy. So are major externalization efforts in the life-science sector. Here are three tips for combining the two. Coverage from Bio-IT World Conference and Expo 2014. My first piece for Enterprise Apps Today.
Healthcare Data Debate: Privacy vs. Public Good
Biomedical researchers at Bio-IT World Conference and Expo 2014 plead "Think of the children!" to manipulate patients into giving up their privacy -- and the proposed payoff is dubious at best.
Cloud Security FUD Drives Genomics Industry towards Cloud-in-a-Box
On-prem turnkey appliances offer an easy anti-cloud solution for genomics researchers. Part 1 of 2. Coverage of Bio-IT World Conference and Expo 2014.
Cyber Insurance Covers That? 7 Items You Might Not Know
An outline of some important but non-obvious coverage items available from cyber-insurance carriers. April 2014.
How to Respond to a Data Breach
An overview of dos and don'ts for data-breach response, from both a legal compliance perspective and a practical business and cybersecurity perspective. March 2014.
Data Breaches and NSA Backdoors: A Legal Primer
Edward Snowden's revelations of government backdoors in systems have created new regulatory compliance headaches for enterprises. December 2013.
Thinking on NSA Excess & Enterprise Implications
The NSA-Snowden scandal presents a case study for Big-Data enterprises on data obsession. Gluttonously gathering too much data isn't merely a problem of offending civil libertarians and data-privacy advocates; it is actually counterproductive to your data analytics efforts. November 2013.
Protect Against NSA Backdoors in Networking Gear
Enterprise tips for guarding against unwelcome government bogeymen. October 2013.
Brits Turn to Twitter to Gauge National Mood
A linguistic sentiment analysis tool for social media may help the UK government predict -- and quell -- economic problems and social unrest before they happen. September 2013.
Externalization & Big Data in Biotech
The pros and cons of external collaboration in the life-science sector. Coverage from Bio-IT World Expo 2013.
We're Not Thinking Big Enough With Storage
When it comes to data in the healthcare and life-science space, big ain't so big. Coverage from Bio-IT World Conference 2012.
Tedious Questions & Other Potential Survey Killers
Don't sacrifice your good will with customers for data's sake. February 2012.
Survey Again and Again for 'Just Right' Results
You're unlikely to get the timing right on customer surveys -- so don't rely on just one. October 2011.
The Beauty of Sentiment Analysis
Sentiment analysis -- linguistic sentiment analysis on social media content, in particular -- has the power to predict the future. Part of a point/counterpoint. My first piece for All Analytics. August 2011.
6 tips for placing your next data center
Tips for and analysis of some of the geographical considerations of choosing a data center location. October 2017.
Verizon's Ritter on Virtualization as a Security Tool: 'Cautious Optimism'
In Part 1 of this 2-part Telco Transformation Q&A, Verizon's Phil Ritter and I talk about the fact that virtualization bears both pros and cons for cybersecurity. October 2017.
Security by Discomfort
Traditional hiring and getting too comfortable with routine and track records of success may be to blame for suboptimal cybersecurity. Coverage from Cybereason's DEEP 2017, in Boston.
Level 3's Richter on Driving Demand for Cloud-Based Security
In Part 1 of this two-part Telco Transformation Q&A, Level 3's Chris Richter and I discuss the customer demand and business strategy driving Level 3's cloud-based Adaptive Network Security solution. October 2017.
The 3 'A's of NFV's Open Source Success
Open source is contributing to NFV success by way of enabling agility, automation, and enhanced accessibility to open APIs. September 2017.
Compliance and Data Privacy Regs IT Security Pros Should Worry About
A rundown of the data-protection compliance landscape in September 2017.
ETSI's Triay on NFV Plugtests, Spec-Fests, Tutorials
Joan Triay, chairman of the NFV Technical Steering Committee of the European Telecommunications Standards Institute (ETSI), brings me up to date on ETSI's current and ongoing standards work in NFV in this September 2017 Q&A for Telco Transformation. Part 1 of 2.
Data Chiefs Demand Data Journalism
Chief Data Officers are finding that they need "data journalists" to drive their Big Data efforts home. Coverage from the 2017 MIT CDOIQ Symposium. My debut piece for Baseline Magazine.
Level 3's Saenger: SDN Takes a Village
In the first of this 3-part Q&A series for Telco Transformation, Level 3's Adam Saenger and I picked up where we left off in our enterprise-cloud discussion to delve into the collaboration and talent demands in the software-defined networking (SDN) space. August 2017.
Verizon's Hakl: SDN Creates Virtualized World
Verizon's Shawn Hakl and I talk about how the telecom giant is leveraging software-defined services for enhanced security. Conclusion of a 3-Part Q&A series for Telco Transformation. August 2017.
OCP's Carter: Open Hardware for Faster Web-Scale IT
Bill Carter, CTO of the Open Compute Project (OCP), and I talk about the role of the open hardware movement in web-scale IT initiatives. Part 1 of a 2-Part Q&A series for Telco Transformation. August 2017.
Red Hat's Hood on Blending Open Source, SDN & Web-Scale IT
Expanding our ongoing SD-WAN conversation into the intersection of software-defined networking and web-scale IT, Red Hat's Ian Hood and I discuss technical and economic considerations thereto—and the role open source has to play. Part 3 of a 4-part Q&A series for Telco Transformation. July 2017.
Personal Security Begets Enterprise Security
Good enterprise security is an unreachable myth without individual employees having a solid foundation in their own personal security. I examine relevant examples and tips for connecting the two in this, my debut piece for Security Now. July 2017.
Is AI Everybody's Job, or Nobody's Job?
Collaboration is becoming all important in the tech world—but if initiatives like artificial intelligence become everybody's responsibility, they may wind up being nobody's responsibility. Includes coverage from the 2017 MIT Sloan CIO Symposium and the 2017 MassIntelligence Conference.
Level 3's Dugan: Customers Crave SD-WAN Expansion of Hybrid Networks
In Part 2 of this Telco Transformation Q&A, Level 3 Communications CTO Andrew Dugan and I talk about use cases and growth potential for SD-WAN, as well as how SD-WAN can help fill in the gaps left by "legacy" MPLS and hybrid networking solutions. June 2017.
Meet the Marketer: Level 3's CMO, Anthony Christie
How did a paperboy become the CMO of one of the biggest network operators in the world? In my DMN interview with Level 3 Communications CMO Anthony Christie, we talk marketing tips, marketing-career advice, tech buzz, and Level 3's just-announced SD-WAN offering. June 20, 2017.
Davis: How Cloud Foundry Helps Create Digital Businesses
Devin Davis, Head of Marketing at the Cloud Foundry Foundation, and I talk about how Cloud Foundry helps create digital businesses by maximizing agility and minimizing fragility. Part 1 of a 2-part Telco Transformation Q&A. Coverage from OpenStack Summit 2017.
Windstream Sees AI Winds Blowing Toward SD-WAN
Data and connectivity are all important in the AI revolution. SD-WAN can help. Coverage from the 2017 MassIntelligence Conference.
The IoT Will Stress Retail Networks
A look at how important AI-enabling and AI-like technologies, such as IoT and SD-WAN, can be to brick-and-mortar retail operations. Coverage from the 2017 MassIntelligence Conference.
IT trends: What you missed at MIT CIO 2017
Coverage from the 2017 MIT Sloan CIO Symposium on IT tips and trends in connectivity, collaboration, and cognitive computing.
Level 3's Saenger: Enterprise Cloud Means Business
In Part 1 of this two-part Q&A for Telco Transformation, Level 3's Adam Saenger and I talk about both the drivers of enterprise-cloud technology and what enterprise-cloud technology itself drives. June 2017.
4 Considerations for Optimizing Your Website
In interviews, keynote speakers at the 2017 Content Marketing Conference weigh in on their top considerations for creating an optimized website design.
How to Build Your Thought-Leadership Campaign from Scratch
Featured: 3 tips for marketing and PR executives that PwC's Paul Dunay shared with me on how to start a thought-leadership campaign from scratch. May 2017.
EdCast's Mehta Talks Killer Apps for AR/VR
My Telco Transformation Q&A with EdCast CEO Karl Mehta on education and training as the potential "killer apps" for augmented reality (AR) and virtual reality (VR), and related issues. Coverage from the 2017 MIT India Conference.
Vendor Lock-In: The Bogeyman in the Cloud
"Don't get locked in!" warn almost all upstart and midsize cloud and other IT-solutions vendors. But how scary is this concept of consolidated vendor lock-in *really*? Is it a monster lurking in the clouds—or just so much wind? My take, for Telco Transformation. April 2017.
Linux Foundation's Joshipura: 5G Demands Cloud Automation & Big Data
The 5G revolution demands enterprise cloud automation—which itself demands advanced Big Data technologies, including predictive analytics, prescriptive analytics, and even AI. Part 2 of my Telco Transformation Q&A with the Linux Foundation's Arpit Joshipura. April 2017.
Zero-Rating Compliance: Easy as Pai?
In the wake of Ajit Pai's ascendancy to FCC Chairman, as pundits speculate that net neutrality's demise is imminent, zero-rated video offerings could be relatively safe—for a little while, at least. March 2017.
AT&T's Nassaur Talks Container Strategy
In Part 2 of my Telco Transformation Q&A w/ AT&T's Doug Nassaur about containers, Nassaur describes his Frankenstein-like approach to containers as he talks about AT&T's two "pathways" of container strategy -- open-container formatting and microservices. March 2017.
How to Make a Hybrid IT Infrastructure More Cost Effective and Agile
In a hybrid IT infrastructure, virtualization and cloud computing are the mutual gifts that keep on giving. In my first piece for HPE's enterprise.nxt, I give an overview of "getting IT together," using virtualized cloud to make your hybrid systems less fragile and more agile. February 2017.
Level 3's McReynolds Gets Real on Virtualized Cloud
In Part 2 of my Telco Transformation interview series with Level 3's Chris McReynolds on managing a virtual cloud environment, McReynolds and I get in depth about the relationship between the cloud and virtualization. January 2017.
Feldman: ThingSpace the IoT Lynchpin of Verizon's Smart Communities
In the second part of a three-part Q&A interview series for Telco Transformation, Verizon exec Daniel Feldman enlightens me on the key role Verizon's IoT DevOps platform, ThingSpace, will play in the telco's branding shift from "Smart Cities" to "Smart Communities." January 2017.
IoT: What Do Customers Really Need?
The Internet of Things market isn't really about the Internet of Things. It's about a network-based solution, where IoT technology is merely incidental. Coverage from the IoT M2M Council's 2016 IoT Platforms & Apps Forum.
The Red Herring of Marketing's "Digital Transformation"
"Digital Marketing" is still just plain ol' marketing -- just gussied up in buzzwords and software. The fundamentals of effective brand management and customer experience continue to apply. Coverage of ITSMA Marketing Vision 2016.
Intel and Broad Commit to Five-Year Genomic Data Engineering Partnership
Building upon earlier collaborations, the Broad Institute and Intel have co-announced a five-year, $25-million partnership to achieve greater scalability, better analytics, and more seamless and accessible data sharing in genomics -- using HPC and artificial intelligence. November 2016.
Two Thirds of Media Executives Accept Virtual Reality Has Arrived – Level 3 Study
A recent Level 3 Communications-commissioned study demonstrates a consensus among top media execs that VR video has truly arrived. November 2016.
5 Essential IoT Security Best Practices
When it comes to IoT security, trust no one. Here are five pointers on cultivating and accomplishing that just-right level of InfoSec paranoia. Coverage from Boston's 2016 IoT Security Summit.
AT&T's Hubbard Discusses SDN Standards & Open Source
Part Three of a three-part Telco Transformation Q&A with Rick Hubbard, Senior Vice President of Networking Product Management for AT&T Mobile & Business Solutions. Discussed: The role of standards and partnerships with open-source bodies in AT&T's SDN outlook. October 2016.
Video Views and Artificial Metrics: The Facebook Scandal That Wasn't
For all the scandal the Facebook three-second video-views controversy has caused, foolish marketers, yellow journalists, and loud-mouthed pundits seem to have forgotten that none of this information is new -- and that FB may be doing things right, after all. October 2016.
Can Feds Compromise on Data Privacy?
Is the proposed McCaul-Warner Commission a means to a true compromise? Or an encryption-killing trap? October 2016.
The Fifty Days of the DRAGEN
Compared to GATK, Edico Genome's DRAGEN system is reportedly red hot in terms of speed, efficacy, and efficiency -- despite the former's ubiquity and excellent reputation. September 2016. Part 1 of 2 in a point-counterpoint series. My first feature for Diagnostics World.
The CDO's Role in Marketing 2.0
Coverage from the 2016 MIT Sloan CDOIQ Symposium on the Chief Data Officer's role in modern marketing initiatives.
Brave New Network: How IT Departments Will Enable Artificial Intelligence
An overview of the demands IT workers will face as AI proliferates. September 2016. Includes coverage from the 2016 MIT Tech Conference.
AT&T's Khan on Platform Approach for IoT
Platforms (and several of them, at that) form the centerpiece of AT&T's IoT strategy. September 2016.
Cloud-Agnostic Platforms Fuel AT&T's IoT DevOps
By making its (numerous) IoT platforms cloud-agnostic, AT&T is making the choice of cloud irrelevant to IoT enablement -- and instead turning the IoT conversation to one about AT&T itself. August 2016.
Chief Data Officer Role Continues to Evolve
A look at how the role of the CDO has evolved since its early days. Coverage from the MIT Sloan CDOIQ Symposium.
Broad's GATK Dominates as Genomics Go-To
With high-quality data thanks to a ubiquitous platform, dozens of thousands of registered users on its forum, a new version right around the corner, and competitor-partnerships galore, the Broad Institute's Genome Analysis Toolkit (GATK) has entrenched itself as a genetics go-to. August 2016.
Verizon Reveals IoT PaaS Analytics Strategy
Despite secrecy, cursory investigation reveals that Verizon hasn't been able to keep a very tight lid on how it will integrate its Big-Data analytics engine into ThingSpace, its IoT DevOps platform. July 2016.
3 Best Practices for Protecting Data Better than Hillary Did
Enterprise InfoSec lessons from the circumstances surrounding former Secretary of State Hillary Clinton's email mismanagement.
The Turnkey Appliance Revolution Evolution in Genomics
A in-depth overview of how the turnkey-appliance market in genomics has evolved over the past few years. June 2016.
Verizon's ThingSpace Opens Up APIs for IoT Developers
Verizon has pledged to expose all of its APIs on its IoT DevOps platform, ThingSpace. June 2016.
A Local Digital Brand Finds Its Audience
A case study of how a front-line digital marketer achieved unheard-of success through digital rebranding. June 2016.
IoT at MIT CIO, Part 1: How IoT Enables Digital Transformation
Coverage from the 2016 MIT Sloan CIO Symposium on IoT's role in digital transformation in the enterprise.
Virtualization Revolutionizes Security in the New IP
People often think of virtualization as presenting security risks -- but, in reality, it can help improve information security substantially. May 2016.
Measuring the IoT Market: Why It Shouldn't Matter
None of the forecasters, analysts, or "experts" can agree on exactly how big IoT will be in the next several years -- and it doesn't matter. What does matter? That IoT will grow -- a lot. May 2016. My first piece for Telco Transformation.
How Blockchain Is Helping Genomics Research
Blockchain's inherent provenance-related benefits hold great potential for advancing genomics research. May 2016. My first article for Bio-IT World.
Reddit's Missing Warrant Canary: What IT Can Learn
Reddit's missing warrant canary hasn't just sparked speculation about government snoops seizing Reddit user data; it has also put the issue of warrant canaries' legal efficacy back in the spotlight. April 2016.
Data Sharing: A Matter of Life and Death
Coverage from Boston's 2016 Bio-IT World Expo, highlighting keynote speaker Heidi Rehm's calls for data-sharing action in genetic research.
AT&T Fights Google Fiber in Courts and Streets
Analysis of the start of legal and PR battles ensuing from the Louisville/Jefferson County Metro government's passage of a controversial ordinance granting Google Fiber broad rights to tinker with AT&T equipment. March 2016.
Iterating Marketing or Irritating Marketing?
A look at marketing automation of customer segmentation, through the eyes of marketing startup Iterable. My first piece for The Hub Comms (now DMN). February 2016.
How CIOs Can Prepare for the Platform Economy
As the digital economy booms, and interconnected users rely more upon each other's contributions, products and services are on the way out -- and platforms are in. Coverage from the 2015 MIT Sloan CIO Symposium.
Making Credit Cards Unhackable
Quantum computing and "Dynamic CVV" could one day make credit cards literally unhackable. May 2015.
Time Wasters at Work: How to Avoid Them
April 2015 InformationWeek slideshow highlighting four ways we lose precious time at work, along with alternatives that can return hours to our work weeks -- and our lives.
Bypassing the Password, Part 2: Trusted Identities
The federal government's collaborative efforts with the private sector to "mov[e] beyond the password" are difficult to trust when there are potentially ulterior motives at play. Part 2 of a 3-part series for InformationWeek on the trouble with biometrics.
The Pop of the Unikernel: The Security Advantage
Part of 2 of 2 highlighting the benefits of unikernels. April 2015.
4 DARPA Bionic Proejcts That Help Humanity
A slideshow overview of some of DARPA's then nascent bionic capabilities -- presented as part of InformationWeek's National Robotics Week 2015 coverage.
iOS Security Reports Say No iPhone Is Safe
An then-recent analysis of the National Vulnerability Database demonstrates that Apple operating systems were by far the most severely insecure in 2014.
Mobile Apps and the FDA: What You Need to Know
A regulatory primer on medical mobile apps. March 2015.
DARPA Robotics Challenge Gears Up for Finale
This March 2015 InformationWeek slideshow provides an overview of highlights regarding the then-upcoming DARPA Robotics Challenge Finals on June 5-6, 2015.
On the Evolution and Extinction of the vSwitch
As hypervisors transform and evolve, will they disappear entirely? My look for The New IP. March 2015.
Treating the Cloud as a Utility
NIST -- via an obscure 140-page document -- has signaled that the federal government wants the cloud to operate as a utility. The problem? Cloud computing *isn't* a utility. That might not stop regulators, however, from trying to get their way on the matter. February 2015.
SEC Cyber-Security Sweep: Good News, Bad News
In this slideshow for Bank Systems & Technology, I offer in-depth analysis of the OCIE's 2/3/15 risk alert detailing the results of its "Cyber Security Examination Sweep" -- and the good news and bad news for broker-dealers and investment advisers.
Minimize Shadow IT Damage by Encouraging Self-Reporting
Employees *will* violate IT policy -- but if something goes wrong, they'll be loathe to admit it. This piece highlights how to encourage employees to self-report their shadow-IT dalliances if they get compromised.
5 Workplace 'Time-Wasters': Worth the Time?
In this slideshow, activities traditionally seen as non-productive are highlighted for their productivity benefits in the workplace. February 2015.
5 Cloud Contract Traps to Avoid
A slideshow featuring five tips for avoiding common pitfalls in negotiating cloud SLAs. January 2015. My first piece for InformationWeek.
The Twelve Days of IT Christmas
A parody of the classic Christmas carol, highlighting links to QuinStreet coverage of relevant IT talking points. A Christmas 2015 special for Enterprise Networking Planet.
The Tech Talent Shortage Myth
Executives kvetch that there is a shortage of IT talent. They are flat out wrong. Coverage from 2014's annual Advanced Cyber Security Center conference.
Eating the Internet of Things
IoT is revolutionizing medicine by way of "smart pills" -- i.e., ingestibles. Coverage from the Global Pediatrics Innovation Summit.
IoT Driving New Business Models
The real value-add of IoT? The opening up of new, imaginative business models. Three examples, from Boston's Connected Cloud Summit 2014, are highlighted here.
Defining the Internet of Things
The buzz and hype surround IoT have caused evangelists to start tacking an IoT label on just about any nascent technology. So what actually *is* IoT -- and what *isn't* it? Coverage of Boston's Connected Cloud Summit 2014.
Two Self-Imposed Obstacles in the Way of the Internet of Things
What's holding enterprises back from realizing the IoT vision of the future? Blame stubborn corporate obstructionism. Coverage of Boston's Connected Cloud Summit 2014.
Patchy Patching: IT Pet Peeves, Part 4
IT pros weigh in on their Number One IT Pet Peeve for the conclusion of this top-ten list for Enterprise Networking Planet. Part 4 of 4. August 2014.
Top 10 IT Pet Peeves, Part 1
IT pros weigh in on this top-ten list of IT pet peeves. Part 1 of 4. Covered here: "Data archaeology" and poor planning. August 2014.
Post Snowden, Google Users Change Habits
An MIT study has shown that the general public is all too aware that Big Brother is watching when they conduct online searches -- compelling SEO strategists to go back to the drawing board. July 2014. Originally appeared in All Analytics. Republished in InformationWeek.
AWS Takes Shot at VMware with New Portal
Amazon's VMware portal aggressively -- and ingeniously -- stands to surreptitiously convert VMware devotees by way of "interpretation amazonia". My first piece for Network Computing. June 2014.
Drones Exploit Wi-Fi to Threaten Security
As Wi-Fi and always-on, always-connected mobile devices proliferate, drones have become a quietly ubiquitous black-hat weapon. April 2014.
Mistrial Resolves Nothing in Juniper-Palo Alto Patent War
Analysis and overview of developments in patent litigation actions between Juniper Networks and Palo Alto Networks after one court proceeding ended in a mistrial. March 2014.
What's at Stake in the Juniper vs. Palo Alto Networks Patent Trial
Pre-trial legal and business analysis of the Juniper Networks v. Palo Alto Networks patent battle. February 2014.
How to Fight Social Engineering
Lessons from the annual Social Engineer Capture the Flag contest (SECTF) on how to stop social-engineering attacks in their tracks. My first piece for eSecurity Planet. November 2013.
They Want Your Enterprise Brains: Night of the Botnet of Things
A particularly prescient special report for Halloween 2013 about the frightening dangers of smart things that go ping in the night.
Reconnecting the CIO and the CMO
An Accenture report identifies "The CMO-CIO Disconnect," but the report's tips for reconnecting the two C-suite offices are naïve at best. October 2013.
OEMs Seek Unbreakable Phones
Duke University researchers' invention of a self-strengthening plastic could one day answer OEM demands for unbreakable mobile devices. September 2013.
Order Can Make a Difference in the Data You Collect
Survey respondents may have short attention spans and/or be confused. Carefully structure your surveys -- and get to the point! April 2012.
GUI Schmooey ‒ You Need to Know Code!
Those fun-looking enterprise analytics GUIs may seem user-friendly, but if your data scientists aren't doing it the hard way and plugging in and documenting the code themselves at some point, data disaster may ensue. March 2012.
If You Want Better Data, Change Your Culture
Bad surveys and bad survey processes (i.e., almost all surveys and survey processes) inherently compel respondents to lie. Novemmber 2011.
CRM Analytics Takes More Than Analytics
Why survey customers if you're not going to directly act on what they tell you? September 2011.
SSDs Might Be Trending Toward the Dumpster
Researchers predict that "2024 is the end" for NAND-based SSD tech. From February, 2012.
ETSI's Leadbeater on Securing NFV With Fundamentals
Virtualization has killed legacy IT's security by obscurity. Hence, NFV requires an even greater foundation in cybersecurity fundamentals than networks of old once did. Part 1 of a Telco Transformation Q&A with BT compliance exec and ETSI NFV Security Group vice chair Alex Leadbeater. October 2017.
The State of CRISPR/Cas9: Patents and Possibilities
An analysis of and update on the CRISPR/Cas9-patent landscape, published hours before the Broad Institute's response brief in the federal appeals court for the D.C. Circuit. October 25, 2017.
Security Takes On Malicious DNA (Files)
Bold comments made at the 2017 Bio-IT World Conference & Expo proposing a laxer "alternative security model" for life-science clinical research bear reexamination after a devastating proof of concept demonstrating that genomic files can carry malicious payloads. September 2017.
Level 3's Adaptive Network Security Expanding to APAC, Africa
My scoop on Level 3's expansions of its Adaptive Network Security offerings in APAC locales as well as in Johannesburg, as well as planned global expansions—particularly in LATAM. October 2, 2017.
Verizon's Oliveira: Orchestration Drives NFV, VNF Automation
In the conclusion of this two-part Telco Transformation Q&A, Verizon's Fred Oliveira talks NFV standards, use cases, and automation—focusing on the context of the orchestration challenges of NFV.
ETSI's Triay: NFV Success Is Built With Foresight, Understanding, Automation
Joan Triay, chairman of the NFV Technical Steering Committee at the European Telecommunications Standards Institute (ETSI), and I talk best practices for moving forward with and evaluating NFV efforts (including NFV automation). Conclusion of a two-part Q&A for Telco Transformation. September 2017.
Level 3's Ewert: Look to Cloud for NFV Models
Level 3's Travis Ewert and I talk about the problems of hype and heroism in NFV. Part 1 of a 2-part Q&A for Telco Transformation. September 2017.
What Can SDN Do for You? – Level 3's Saenger
Level 3's Adam Saenger and I talk about best practices for and barriers to both getting started with new SDN deployment initiatives and reevaluating existing ones. Conclusion of a 3-part Q&A series for Telco Transformation. August 2017.
NTT's Okoshi on Enabling Cloud-Based Digital Transformations
A Q&A with NTT Communications cloud-solutions marketer Rui Okoshi on how her company's approach to enterprise digital transformation. Coverage from Boston's OpenStack Summit 2017.
Lawyers Are Friends, Not Foes, in InfoSec
The efforts and expertise of legal and compliance teams are essential to good enterprise information security and data protection. August 2017.
The Game of Thrones CIO: 5 lessons of IT and fire
Using examples that span the length of the hit series, I offer 5 real-life lessons that IT leaders can draw from how characters from HBO's "Game of Thrones" handle life-or-death situations and suggest how they can apply their lessons to their own IT organizations. August 2017.
Red Hat's Hood Talks Security for SD-WAN
Ian Hood, of Red Hat, and I continue our SD-WAN conversation to examine the architectural and security challenges of SD-WAN—particularly in the context of Big Video. Part 2 of a 4-Part Q&A series for Telco Transformation. July 2017.
Verizon's Hakl on SD-WAN Evolution
In Part 2 of this 3-part Q&A for Telco Transformation, Verizon exec Shawn Hakl and our continue our virtualization discussion to delve into the past, present, and future of SD-WAN and virtualization-enabled intelligent networks. July 2017.
Sky Italia's Gandino Talks OTT Challenges, Viewing Trends & AI
In Part 2 of this Telco Transformation Q&A, Sky Italia's Davide Gandino and I talk about trends in and drivers of OTT video platforms and content, the role of AI in OTT, and how OTT has become an anti-churn "loss leader" of sorts among Sky Italia's offerings. Coverage from the 2017 Red Hat Summit.
Dugan: Level 3's SD-WAN Raises All Access Ships
In Part 1 of this 2-part Telco Transformation Q&A, Level 3 CTO Andrew Dugan and I talk about SD-WAN and MPLS, the networking market, and how Level 3's recently-announced SD-WAN product will impact the market as a whole while complementing other solutions. June 2017.
Cloud Foundry's Davis on Open-Source Multi-Cloud
Devin Davis, Head of Marketing at the Cloud Foundry Foundation, and I talk about colocation, open-source multi-cloud, and the cloud impact of video content delivery in Part 2 of this 2-part Telco Transformation Q&A. Coverage from OpenStack Summit 2017.
CL's Lane Talks Drivers for AI, VR, Gaming
In Part 2 of this 2-part Telco Transformation Q&A, CenturyLink's Gahn Lane and I talk about how the gaming industry is driving both AI tech and Big Video technologies like augmented reality (AR) and virtual reality (VR) in both B2C and B2B. Coverage from Red Hat Summit 2017.
Sky Italia's Gandino Talks OTT Scalability, UX With OpenShift
Sky Italia OTT exec Davide Gandino and I talk about the roles of mobility, UX, virtualization, network efficiency, and OpenShift in Sky Italia's OTT platforms and VoD. Part 1 of 2 of a Telco Transformation Q&A. Coverage from Red Hat Summit 2017.
Tidbits From The Trenches: BioTeam Panelists Advocate Decentralization
A broad overview of the BioTeam "Trends from the Trenches" panel at Bio-IT World Conference & Expo 2017, covering hyperconvergence, cloud computing, storage, data management, information security, and life-science IT leadership.
Rommie Amaro on Curing Cancer at Exascale
Coverage from and insights on Rommie Amaro's opening plenary keynote at the 2017 Bio-IT World Conference & Expo.
StoryUp's Hill on Enabling & Optimizing VR
In Part 2 of this Telco Transformation Q&A, StoryUp VR CEO Sarah Hill and I talk about enabling VR adoption and lowering the barriers to entry. May 2017.
UX Is Content; Content Is UX.
When it comes to web content and web design, UX (user experience) is the new relevance. Coverage from the 2017 Content Marketing Conference.
Viacom 18's Vats Talks AR/VR, Video AI
In Part 2 of this Telco Transformation Q&A, Viacom 18 Group CEO Sudhanshu Vats talk about examples of high-tech video transformation already happening or about to happen in India driven by AR, VR, AI, and Big Data analytics. Coverage from the 2017 MIT India Conference.
Vats on Voot: Viacom 18 Goes Agnostic
Increasing viewer demand for pipe- and screen-agnostic content has been driving OTT adoption in India. Part 1 of 2 of my Telco Transformation Q&A with Sudhanshu Vats, Group CEO of Viacom18. Coverage from the 2017 MIT India Conference.
How to Use ABM for Customer Acquisition
Account-Based Marketing (ABM) isn't just for your most strategic existing accounts; it can also be applied to hunt that "whale account" that you've had your eye on. My take for DMN on the conjunction of ABM and what I call "Ahab Marketing". April 2017.
Linux Foundation's Joshipura on Building Open Enterprise Cloud
Open-source cloud enablement in the enterprise isn't just about open source. It's about taking disparate parts—including proprietary ones—and making a cohesive, efficient, effective networking whole. Part 1 of a Telco Transformation Q&A with the Linux Foundation's Arpit Joshipura. March 2017.
ABM and Cluster Marketing, Part II: Using a "Lite" Touch
An examination of how to identify accounts that are appropriate for an ABM Lite approach—and how to identify and create target "clusters" of accounts, accordingly. Part 2 of a 2-part report for DMN about ABM Lite. March 2017.
AT&T's Nassaur: Keep an Open Mind on Containers
In the Part 1 of this Q&A series for Telco Transformation, AT&T lead systems architect Doug Nassaur shares with me details on AT&T's philosophies and strategies related to open containerization. February 2017.
Beyond CRISPR Cuts: Five Complements To Cas9
An overview of a handful of gene-editing alternatives and complements to CRISPR/Cas9. February 2017.
Level 3's McReynolds Talks About Better IT Cloud Management
Level 3 exec Chris McReynolds shares his insights on maintaining visibility of network usage in the cloud -- particularly with the help of virtualization technologies -- in the first part of an interview series with Telco Transformation. January 2017.
Verizon's Feldman: IoT Focus Shifts From Smart Cities to Smart Communities
Smart Cities? Yawn. Soooo 2015. For Verizon, the public-sector IoT vertical is all about "Smart Communities." In the first of a three-part interview series for Telco Transformation, Verizon IoT executive Daniel Feldman explains the difference between the two. January 2017.
4 Ways to Upgrade Your Threat Sharing
OUT: "Threat sharing." IN: "Collaborative Defense." Top InfoSec brass weigh in on achieving a 360-degree view on cybersecurity. Coverage from the 2016 Advanced Cyber Security Center annual conference.
ABM Requires Sales Account Plan Integration
Coverage from ITSMA Marketing Vision 2016 highlighting the need for collaborative teamwork between marketers and salespeople to make account-based marketing (ABM) successful -- specifically, by integrating marketing's ABM plan with the sales team's account plans. The second of two reports.
Whose Customer Is It Anyway?
Marketers may think they're naturally "above" sales teams, but effective marketing can't happen without proper sales enablement, good communication, and teamwork. Coverage from ITSMA Marketing Vision 2016.
Christie: Level 3 'Eats' Its Own Video
In the 2nd of this 2-part Telco Transformation Q&A, Level 3 Communications CMO Anthony Christie explains how and why "[w]e eat our own cooking" when it comes to Level 3's use of internal productive video -- and how it contributes to DevOps and other operational functions. November 2016.
Smarter ELNs and Smarter Labs Make for Smarter Science
Cloud, IoT, and AR will combine to make a more efficient "smart laboratory" of the future. Coverage from the Pistoia Alliance's 2016 US conference.
AT&T's Hubbard: How SDN Helps Platforms Thrive
Part Two of a three-part Telco Transformation Q&A with Rick Hubbard, Senior Vice President of Networking Product Management for AT&T Mobile & Business Solutions. Discussed: More AT&T SDN strategy, virtualization security FUD, and virtualization's role in the scalable platform economy. Oct. 2016.
Mobile Is Critical for In-Store Retail(?)
A dubious look at studies claiming that a lack of mobile engagement is the biggest problem retailers face. October 2016.
AT&T Embraces Connectivity for IoT Flexibility
A look at some of AT&T's low-power connectivity moves, when it comes to IoT. October 2016.
The Hidden Costs of Creating Marketing Content
In what is reported the first study of marketing-creation costs, Percolate claims that marketing departments spend too much money on their creative and analytics. September 2016.
Selecting a Threat Risk Model for Your Organization, Part Two
In Part 2 of 2 in this series for eSecurity Planet, threat-risk models Trike (CRUD) , MIL-STD-882E, and OCTAVE are compared and contrasted with each other -- as well as those threat-risk models highlighted in Part 1 (STRIDE, DREAD, and CVSS). September 2016.
3 Cases of InfoSec Hubris That Led to Big Breaches
An Aristotelian feature highlighting the tragic flaws of the DNC, TJX, and "cybersecurity advisor" Joseph Black. September 2016.
How AT&T Prioritizes IoT Verticals
An examination of how AT&T presently claims to prioritize vertical markets for its IoT solutions -- juxtaposed against earlier, conflicting claims. September 2016.
IoT: Khan Lays Out AT&T's Investments, Partnerships & Challenges
A Telco Transformation Q&A with Mobeen Khan, Assistant Vice President of Strategy and Product Management for AT&T IoT Solutions, on AT&T's IoT connectivity plans. August 2016.
Unify Marketing Operations with Data Management and Predictive Analytics
Data management, when fueled by predictive analytics, is a marketing power tool. Coverage from the 2016 MIT Sloan CDOIQ Symposium.
CDOs and Data Science's Evolving Role in Healthcare and Life Science
Collaboration -- even when people don't want it -- is the name of the game for Chief Data Officers in healthcare and the life sciences. Coverage from the 2016 MIT Sloan CDOIQ Symposium. My first article for Clinical Informatics News.
The Seven Bridges CGC: Boon for Bioinformatics, Success for a Startup
When Seven Bridges Genomics was the only commercial entity to win an NIH grant to build its Cancer Genomics Cloud, the Cambridge, Massachusetts, startup had truly arrived. July 2016.
3 Data-Protection Tips in Light of Proposed Cybersecurity Laws
Food for thought as Capitol Hill cyberhawks attempt to wage a cold war on encryption. July 2016.
Verizon's IoT Marketplace: One-Stop Shop for DevOps
An in-depth preview of Verizon Marketplace -- an app store coming soon to Verizon ThingSpace, the telco's IoT DevOps platform. June 2016.
The IoT Revolution: Democratizing DevOps
The IoT revolution has fueled greater DevOps accessibility. Coverage from the Massachusetts Technology Leadership Council's 2016 Internet of Things Conference.
How Bad Is Burr-Feinstein Anti-Encryption Legislation?
A seeming post-mortem on both obvious and latent problems in the proposed -- and subsequently sidelined -- Compliance with Court Orders Act of 2016. June 2016.
Translating Your Marketing Beyond the Olympics
The 2016 Summer Olympics have presented an opportunity for marketers to identify how to best "translate" their marketing and social media efforts -- both linguistically and culturally. May 2016.
Top 3 Data Security Lessons from Bio-IT World Expo 2016
Security insights on virtualization, the cloud, and big-data analytics in the healthtech and life-sciences space.
The Art and Science of Price Optimization
Coverage from an April 28 "lunch and learn" presentation on recurring-revenue business models.
Customer Intimacy in a Software Economy
Coverage of an April 2016 webinar on cloud-based business models, in which cloud consultant Jeff Kaplan announced the death of traditional market-leader wisdom.
Video Webcast Tips from West
As video grows more important, so too do training and best practices for video webcasts. April 2016.
Network Security Policy Best Practices 101: Improving Password Policy
A highlights feature on est practices in authentication. Coverage of the February 2016 meeting of the National Association of Information Security Guild (NAISG), Boston chapter.
Campaign Digital Marketing: Is Less More, or Is More More?
An overview of Iterable's comparative analysis of digital user engagement between campaigns in the 2016 Presidential Election. March 2016.
The High Price of IT Downtime
An IHS study indicates that downtime events at midsize companies cost, on average, $1 million a pop -- while at large enterprises, they average $60 million per. My overview on the causes and how to reduce downtime risk. January 2016.
Cyber Security and the CIO: Changing the Conversation
Do CIOs have inherent conflicts of interest with CISOs? To whom should the CISO ultimately answer? (This InformationWeek coverage of the 2015 MIT Sloan CIO Symposium has been influential in changing the CIO and CISO chain of command within the US Department of Health and Human Services.)
Outer Space IoT
In this Star Wars Day (2015) special for The New IP, satellite-based connectivity for Sigfox's LPWAN promises wonders for IoT deployment that are out of this world.
Plan X: DARPA's Revolutionary Cyber Security Platform
April 2015 InformationWeek slideshow highlighting DARPA's Plan X -- and its aims to make active cyber defense more accessible to the masses through agility, training, and intuitive interfaces.
Bypassing the Password, Part 1: Windows 10 Scaremongering
Microsoft's hype of its upcoming biometrics system in Windows 10, spouting the virtues of biometrics over traditional password-based security, seems misguided at best -- misleading at worst. Part 1 of a 3-part series for InformationWeek on the trouble with biometrics.
The Pop of the Unikernel: The Efficiency Advantage
Part of 1 of 2 highlighting the benefits of unikernels. April 2015.
Robots Unleashed: 4 Reasons We're Not Doomed
As part of InformationWeek's National Robotics Week 2015 coverage, this slideshow offers some good reasons to doubt the robot apocalypse.
Cloud-Driven Competition Compels Company Collaboration
Considerations for ISVs and OEMs, and other enterprises as cloud computing lowers barriers to entry. Coverage from Boston's invitation-only Oracle Cloud Roadshow in February 2015.
Will 2015 Be Adobe Flash's Swan Song?
Increasing coverage of Adobe Flash's endless vulnerabilities indicate that this ubiquitous and constantly exploited software may be on its way out. March 2015.
Clintonemail.com: A Cautionary Call to Action
The Clintonemail.com brouhaha presents important Shadow IT lessons for the enterprise. March 2015.
A Hardware Story
Virtualization and whiteboxing are hot -- but they still don't exactly spell extinction for proprietary hardware. March 2015.
Net Neutrality Vote Won't End Debate
In this February 26, 2015, piece -- published the same day as the FCC's "Net Neutrality" vote -- I make clear that the day's FCC vote is but the first step along a long legal row to hoe to make Commissioner Tom Wheeler's dreams come true.
Anthem Could Face Legal Fallout from Hack
A look at the legal and regulatory problems Anthem could face in the wake of the major hack that compromised its customers. February 2015.
6 Ways To Show Your CIO Some Love This Valentine’s Day
In this slideshow, I highlight some suggestions for thoughtfulness at the workplace that the boss might appreciate. A pre-Valentine's Day 2015 special for InformationWeek.
Net Neutrality: 4 Legal Challenges to Consider
A slideshow overview of expected legal arguments against the FCC Chairman Tom Wheeler's then-proposed "Net Neutrality" regulations -- and how those arguments might be expected to fare. February 2015.
3 Cyber Security Lessons from Super Bowl XLIX
In this bit of Monday-morning quarterbacking, I draw parallels between atrocities from the previous night's big game and atrocities regularly committed by the IT department.
An Ounce of Prevention
The NIST Cybersecurity Framework is helpful (and sometimes even necessary) for InfoSec and compliance efforts -- but it's not the be-all and end-all. Coverage from two 11/14 Boston events: the NRS Technology & Communication Compliance Forum, and the annual Advanced Cyber Security Center conference.
Collaboration Is Key to Cybersecurity
Frameworks, welcoming hackers to the table, and getting individuals to openly collaborate on cybersecurity will improve cybersecurity. Coverage of two Boston events in 11/14: the NRS Technology & Communication Compliance Forum, and the Advanced Cyber Security Center annual conference.
Network Security Must Focus on Incident Response
"M&M security" (hard on the outside, soft in the middle) is all too common. Expect to have your outer layers breached, and plan from there. Coverage from two 11/14 events in Boston: the NRS Technology & Compliance Communication Forum, and the annual Advanced Cyber Security Center conference.
Hack Early, Hack Often: The Perils of Electronic Voting
Electronic voting of any kind (let alone online voting) is all too easily hacked. An Election Day 2014 special for Enterprise Networking Planet.
Opinion: TrueCrypt and the Myth of Open-Source Security
As numerous, major security flaws in popular open-source software have come to light, the self-righteousness preaching that open-source is inherently more secure than proprietary software can no longer be blindly accepted. My award-winning op-ed for Enterprise Networking Planet. October 2014.
Wireless Mesh Networks for Internet of Things Latency
Speakers at Boston's Connected Cloud Summit (2014) indicate that some form of distributed mesh networking may be the ultimate answer for IoT ubiquity.
End User Goofs and Who's to Blame: Top 10 IT Pet Peeves, Part 3
IT pros weigh in on this top-ten list of IT pet peeves for Enterprise Networking Planet. Part 3 of 4. August 2014.
Predicting the Unplanned Outage
Predicting "unplanned outages" was once the stuff of Dilbert jokes. Today, big-data analytics engines -- combined with effective collaboration -- makes it a reality. July 2014.
Identity and Access Management's Role in Secure Cloud Collaboration
Cloud-based externalization in the healthcare and life-sciences sector has heightened the need for secure, cloud-based IAM solutions. Coverage from Bio-IT World Conference and Expo 2014.
Cloud Security FUD Drives Genomics Industry towards Cloud-in-a-Box, Part 2
Turnkey "cloud-in-a-box" on-prem machines offer a myriad of storage, infrastructure, and compliance benefits for the life-sciences sector -- and are still compatible with the actual cloud. Part 2 of 2. Coverage of Bio-IT World Conference and Expo 2014.
The Mask Raises Network Security Worries in an Age of Cyberwarfare
Malware known as "Careto" (or, "The Mask") went undetected for five years, quietly collecting sensitive information. How can enterprises guard against it -- and what else is out there?
Cyber Insurance: 6 Facts You Should Know
An award-winning overview of basic need-to-knows for businesses considering cyber insurance. March 2014.
'Twas the Night before Christmas (in the Data Center)
A Christmas 2013 parody that puts an IT twist on the Clement Clarke Moore classic.
Fishing for Underwater Data Solutions
On an electrical-engineering professor's efforts to bring Internet connectivity to the 70 percent of the world that's covered by water. November 2013.
Congressional Tweets Tell a Disturbing Story
Linguistic sentimental analysis of Congressional Twitter feeds conducted by poli-sci professor Adam Ramey reveals the degrees to which US legislators are likely to work together -- or obstruct each other. October 2013.
Passwords May Never Die for Legal Reasons
The much maligned password is still better than inherently flawed biometrics -- if for no other reason than the Fifth Amendment. October 2013.
The Tao of Xen
Industry analysis from the hypervisor-market perspective on Citrix's donation of Xen to the Linux Foundation. May 2013.
Storage Doesn't Matter for Bioinformatics? Not So Fast
Despite higher-level problems of accessibility, integration, search, and analysis, the biggest tech problem facing bioinformatics may be a storage problem. Coverage from Bio-IT World Conference 2012.
Considering Your Analytics in Retrospect
Want better data-science processes? Work backwards. February 2012.
Three Little Tricks for Boosting Survey Effectiveness
Tips from an organizational expert on trading in respondent subjectivity for benchmarks in your surveys. October 2011.
Why One-Question Surveys Make for Bad Analytics
Netflix-like customer-service surveys -- consisting of but one question -- miss the bigger picture. August 2011.
Problems Hinder EMV Use in US
Despite what Europeans and big banks have to say, EMV is far from perfect. My first piece for Enterprise Efficiency. December 2011.

Worth Following

Keith Dawson

Freelance writer, journalist, technologist, bellwether, recovering physicist.

How To Join IPG

If you are a seasoned journalism professional, you may apply to join the IPG.

Please visit our Membership Requirements page and follow the directions completely.

Search

© 1995-2025 Internet Press Guild, a professional organization promoting excellence in Internet and technology journalism.
Production Credits