Archive for December 2009

Dial That Number

One of my annual process checks is to revisit my personal Disaster Recovery Plan. I usually try to develop a thorough way to recover from any personal disaster that could affect how I work in my business and how I keep my life sane.
Continue reading ‘Dial That Number’ »

Award Reward

It’s getting to be that time where everyone is creating their best of / worst of lists for 2009. All this year end hype is just great fodder for what usually is a slow news time. What’s surprising about the Internet Telephony’s awards is who has shown up.
Continue reading ‘Award Reward’ »

Theremon Revisited

For those of you who are fans of creepy science fiction you will know only too well the sound of the theremon. That strange electric instrument that is the mainstay of sound effects in most low budget scifi. Now you can get it in your mobile phone.
Continue reading ‘Theremon Revisited’ »

IPV4 Step Aside Here’s IPV6 Simplified

We’ve put off trying to completely understand what IPV6 will truly mean in our world. Enough, Enough! There is a simplified understanding over at Wireless Moves written by Martin Sauter.
Continue reading ‘IPV4 Step Aside Here’s IPV6 Simplified’ »

Do Not Call Redux

We’ve written before about privacy and the notoriously flimsy Do Not Call list that is shielding your right to privacy here in the GWN. It seems that in the UK things are not getting better.
Continue reading ‘Do Not Call Redux’ »

Future First

We have been involved with a number of strategic think tanks and have participated in numerous strategy planning sessions. We’ve spoken a bit before about strategy but yesterday we came across an interesting blog by John Roese—its worth a read.
Continue reading ‘Future First’ »

Godzilla Of Network Security

One of the truly fascinating OSS companies in the world is Arbor Networks. While the rest of the planet cowers at the sight of Denial of Service attacks and their ilk, the valiant digitally armored from Arbor ride into the Valley of Data.
Continue reading ‘Godzilla Of Network Security’ »