Search Tag: - clear 
security 
7Votes
Promote Idea
Promote
Demote Idea
Demote
D179   Category: General     Status: Pending

Most companies still rely on employees following rules and procedures in order to keep their sensitive data secure.  Rules such as "don't write your password down" or "don’t take your company laptop home" are the weak link in data security.  If IT security is deployed and procedures are specified but users don't comply, is the company really protected at all?  Most companies believe they can control user behavior with reasonable security policy.  But they can't.  Employees cut corners, "cheat" the rules, or are just plain lazy.  They put passwords in their briefcases, take company laptops home, leave notebooks in rental cars, download files to their laptops that they're not supposed to.  Not providing for a fix in such situations is tantamount to giving employees a vote in whether a security set-up will work - and the employees shouldn't have a vote, should they?

Fail-safe, technology-driven controls such as triggered data destruction are essential for real IT security, a

More...

16 comment »  

 
2Votes
Promote Idea
Promote
Demote Idea
Demote
D168   Category: General     Status: Pending

 

Every time a 'crack'berry server breaks down for two hours the business world is flipped upside-down.

 

Commanding a substantial global R&D investment, cell phones have become the pinnacle of technology advancement this decade - taking on an increasingly converged approach with GPS, PDA, MP3 and becoming an even more critical part of our life.

 

Since airports now charge travelers a per-luggage fee, laptops have become an expensive proposition for the frequent flyer making cell phones as laptop replacements an even more viable future. Bill Gates foresees cell phones that can easily connect to TVs and keyboards becoming full-fledged laptop replacements.

In the Philippines 5.5 million people already use cell phones as digital wallets and the portable MP3 player is an archaic concept.

 

The flip side of this new high-tech world is that your personal information (bank accounts, contacts, text messages, addresses) are in one small device that is often lost or stolen and which is constantly co

More...

14 comment »  

 
1Votes
Promote Idea
Promote
Demote Idea
Demote
D162   Category: General     Status: Pending

With exacqVision surveillance systems, you can access video from your Windows PC, Linux computer, Macintosh or just about any handheld mobile device with Internet access. Imagine pulling up live surveillance video from your iPhone because you receive an e-mail on the same device indicated that an alarm has been triggered.

 

Our company, Exacq Technologies, utilizes today's latest network video surveillance cameras (also referred to as "IP cameras) and legacy analog surveillance cameras with our exacqVision Video Management System (VMS) software. Analog cameras have been used in security applications for well over fifty years. While the basic technoloy is dated, they are still reliable and plentiful in the field. Ripping these cameras out to replace them with network cameras is not always the best and most cost-efficient solution. However, network cameras offer greater video resolution while utilizing computer networks to transmit video data. Analog surveillance video is similar to stand

More...

16 comment »  

 
Displaying results 1 - 3 of 3
Invite A Friend
Community Statistics
357 Submissions
2,246 Comments
1,052 Votes
999 Users
Leaderboard
UserPoints
kvan189 
myles129 
mluke129 
justinkistner123 
brandonmuth117 
Kate.Stern117 
rebecca111 
sdavis96 
lrmclean87 
little78