CounterPath Hosted Service Delivers Over-the-Top Fixed Mobile ServicesFeel the Nostalgia! Turn Rotary Phone into a VoIPITW and an iPad AppFacebook's Zuckerberg, Closed App Stores and HTML5
Fix for Skype Sign In ProblemSkype for Asterisk Killed - The LowdownOpen Source + JAIN SLEE: Mobicents Makes SenseStop Organizing your Emails into Folders! It's Less Efficient
CounterPath Partner Program for ITSPs Aims to Simplify MobileFamily Plans Coming to VerizonTDCloud Joins the FrayDisney World Vacation Trip Report
This week's CEO was the head of Hooters who went undercover at several restaurants as well as the Hooters plant that manufactures their sauces and dressings. I was really struck by how different the two episodes were. Continue Reading...
First, the basics: The objective of PCI is to implement a worldwide information security standard so that all merchants that accept credit cards would be required to protect cardholder data by complying with a set of universal security standards. Continue Reading...
In conducting market research and talking to IT staff in the field, I am always surprised to see compliance and security officers operating independent of one another. Sure, not all compliance is security compliance, but the two intersect in enough ways to warrant tight collaboration. Not only do data security regulations, such as Payment Card Industry (PCI) Security Standards, require additional network visibility and control, but regulations that may on the surface seem unrelated to IT, such as those involving personnel actions, often require documentation from IT relating to an employee's online activity. Continue Reading...
Thank you for taking the time to stop and read my newly created blog. I intend on using this forum to discuss issues concerning regulatory compliance and the challenges currently faced by IT staff in gaining visibility and control of their network resources. I hope that you will check with me regularly and contribute to the conversation. I welcome all suggestions and look forward to discussing the trends, developments and issues in NAC, E911 and PCI compliance, Cloud Computing, Virtualization, Bandwidth Management, and more.
I look forward to meeting you soon!