Here, I’ve outlined (with graphics) the 4 types of wireless controller systems that can be used to describe all types of products in the marketplace.
Next week, I'll be presenting on trusted infrastructure at the 2nd Annual NSA Trusted Computing Conference in Orlando. This year's focus is Using COTS technologies to...
The new 802.1X-2010 (formerly referred to here as 802.1X-REV) offers a multi-faceted approach to increasing integrity, availability and confidentiality throughout...
Simply amazing, I’m going to summarize this article here, and provide links to the original posting at the Daily Caller. Here’s what happened: A contracts...
I may have fallen off the blog radar for a bit, but I assure you it’s for good reason. Along with our annual IT Hot Topics Conference, wedding planning and...