All Data Is Consequential

tinerstake-apple-feat-1015.jpg

As the world moves further and further into a technology-enabled and -dependent world, serious questions arise about personal and institutional privacy. Recently, news headlines have revealed that a seemingly innocuous bit of data could have far reaching and deadly side effects. Over the past several years, the U.S. Army has issued fitness trackers to its […]

Read more

Hello? Is Anyone Listening?

echo-dot-home-0117b.png

Amazon’s hottest selling items for 2016 were the Echo and its little brother Dot. These devices, along with their competitors from Google and Apple, are revolutionizing the way we interact with our homes and are quickly moving into the workplace. These voice command and control devices allow the participant to use their voices with simple […]

Read more

On Privacy, Convenience and Pirate Scanners

privacyfeat.jpg

Last week, I returned from InfoComm. It was the usual manic event, with the usual results. 39,000 people crowded the aisles to see products and services from over 400 suppliers. Many, many of us took the opportunity to rub elbows with our peers from around the world, increasing the sale of beer and soft drinks […]

Read more

Privacy Concerns

dataconcernsfeat.png

Data and privacy concerns are the topic of constant news and media coverage. Who is watching you when, who is gathering data on you and what type are questions that are always being asked. Our network security teams are very educated in these areas and work tirelessly to make sure our institutions (and therefore our […]

Read more

BYOD Part 1: Enterprise Strategy and Policy

BYOD-Strategy.jpg

Bring Your Own Device (BYOD) refers to an organization-led program which permits employees to bring personally owned mobile devices (laptops, tablets, and smart phones) to their workplace, and to use those devices to access privileged company information and applications. It is a known enterprise mobile strategy which has gained acceptance in numerous markets: • Corporate: BYOD is […]

Read more

AVI-SPL Intros Privacy Features for Meetings

BlockMe-0114.jpg

AVI-SPL has introduced two new features addressing the increased concern by customers about unauthorized video calls into meeting rooms. AVI-SPL’s expanded solution portfolio allows clients in varying industries to easily incorporate privacy safeguards into their day-to-day conferencing experiences. VNOC Symphony Automated Room Shutdown: VNOC Symphony’s Business Processes Automation Module hinders uninvited guests from seeing or […]

Read more

2 B or not 2 B (What Makes the Next Gen Client Different)

featured-crewcall.jpg

Last month, we talked about the idea that the next generation of client will have changing standards in quality, production values and even the very nature of work and communication. I proposed that these changes would create fundamental differences in the way they made purchase decisions, especially those involving the public communications aspect of what […]

Read more