Opinions

supply chain management problems in need of solutions
Broken window with Windows 10 logo

security threats and vulnerabilities

Why I don’t believe Bloomberg’s Chinese spy chip report

China can and has stolen the information it wants from US companies without using secretly embedded hardware, so why would it jeopardize its massive semiconductor industry?

google home

The first smart display for business: Your Android phone

Here’s why I think Google will announce a ‘smart display’ feature this week for Android optimized for business use.

dell chromebook 11 lid march 2014

Why Chromebooks are a bigger threat to Microsoft than you know

Google is somewhat stealthily winning mind share with youths.

blockchain in healthcare / doctor accesses one block in a chain of digital medical records

Can digital identity cure the chronically ill?

A secure, verifiable digital identity for patients would improve communication and information sharing across multiple specialists and caregivers.

5g smart city iot wireless silver platter tablet service

Why 5G will disappoint everyone

Wireless connections that are 20 times faster? What could be disappointing about that?

Facebook / privacy / security / breach / wide-eyed fear

Hey Facebook: Quit discouraging people from using 2FA

Facebook is spying on user 2FA phone numbers to target them with ads. A non-trivial percentage of Facebook users will not use two-factor authentication as a result, a net loss to security.

android 3
video

3 Reasons Why You Should Buy a Cheap Android Phone This October

What are you really getting when you spend a thousand dollars on a new phone?

russian hacking us election  putin voting fraud hacked

“Everything is fine” vs. “we’re doomed” isn’t the way to frame election security

The extremes of despair and optimism are both dangerous to information security. What we need to do is calmly assess the threats.

paper white speech bubble. 165143101

Why everyone is talking about everything talking

Suddenly, we’re looking at voice-first everything — including the voice-first workplace.

team teamwork analysis

How we did it: 10 hot hybrid-cloud startups to watch

Getting chosen for the hot 10 hybrid-cloud startups list meant a good idea, strong leadership, adequate funding and no bull.

clouded view of data center

10 hot hybrid-cloud startups to watch

With few enterprises using purely private or purely public cloud infrastructure, startups have emerged to meet unique hybrid-cloud needs for management, storage and virtualization. Here are 10 hot hybrid cloud startups to keep an eye...

google inbox by gmail logo

In killing Inbox, Google takes another swipe at its most passionate users

It fits a pattern that tells us that Google sees everyone as having equal value, which just isn’t true.

risk assessment - safety analysis - security audit

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

clock superimposed on monthly calendar

Prepping for Dreamforce 2018: What to do now

Dreamforce is approaching, and the way to get the most out of that week in San Fran is by planning ahead.

smartphone checking email mobile device

A new phone-like device from Redmond? Why, Microsoft, why?

Microsoft’s smartphone failures have been spectacularly costly. Could it really be planning to give it another go?

comment troll thinkstock

Social media and trolls: The end is near

A new service uses NFC and blockchain to end trolling forever. (And just in time.)

1 weakest link broken rusted chain security breach hacked

10 topics every security training program should cover

A thorough end-user education program is a necessary weapon in the battle to protect your perimeter. These 10 topics are the baseline of what to include in an awareness training program.

google search2

What is a search engine, anyway?

If you think a search engine exists as an index to the internet, it’s time to update your thinking.

Load More