To understand the significance of voice over IP (VoIP), it’s useful to travel back in time. Specifically, go to 4.45am on Sunday, September 3, 1967. If you happened to be in a car in Sweden at that moment, you had to stop the car and do nothing for five minutes. Then at 4.50am you had to move your car from the left side of the road to the right, and then stop again. Finally, at 5am, you could proceed, on the right. In those 15 minutes, the entire country changed a 300-year-old custom of vänstertrafik, left-side driving, to högertrafik, right-side driving.
Stories by Scott Berinato
We've gotten used to surrendering our luggage to airport searches. In some cases, small pads are swabbed on our personal belongings and then run through a machine that looks for leftover particles of malicious materials like gunpowder or biohazards. Now, a similar process is finding its way into the corporate environment to test employees for drug use.
FRAMINGHAM (03/17/2004) - Question: What are you doing about spending on IT analysts and research?
FRAMINGHAM (03/15/2004) - When the national antiterrorism threat condition changed hue from Elevated Yellow to High Orange last December, the secretary of the U.S. Department of Homeland Security, Tom Ridge, following what had become standard procedure for such alerts, issued a statement to the public explaining the move
FRAMINGHAM (11/05/2003) - Since 9/11, few counterterrorism technologies have been hyped more than face recognition. Recently, though, reality interrupted the hype when two public pilot projects of the technology ended.
FRAMINGHAM (10/08/2003) - Robert Liscouski is the assistant secretary of the Infrastructure Protection and National Cyber Security Division in the U.S. Department of Homeland Security (DHS). When Liscouski visited CSO this summer, we got his views on some of the challenges facing the DHS.
In the strongest sign yet that the government will, if it must, regulate corporate security, the US Federal Trade Commission (FTC) is cracking down on companies with lax security on their websites.
Bruce Schneier, who literally wrote the book on cryptography, talks with Scott Berinato about his holistic view of security, both physical and technical.
Do you find that you're incapable of stopping upgrades? Do you spend much of your day patching security holes? Do you have a vague sense that you're spending too much money on software? If you answered yes to any of those questions, you may have become overly dependent on Microsoft. Here's a handy 12-step programme to cure your condition.
- Data Management Officer NSW
- Business Process Analyst (Green Belt) NSW
- Business Analyst NSW
- Senior MySQL Database Administrator - Sydney VIC
- Technical Business Analyst (Rules/ Real time analysis) VIC
- Cyber Analyst VIC
- JD Edwards Principle/ Functional Consultant VIC
- Data Migration & SQL Administrator VIC
- Adlib Developer VIC
- Operations Manager - Data Centre WA