All in Security

We (Martin McKeay, Dan Sweet, Robyn Tippins, Jeremiah Owyang, and I) had fun schmoozing about three topics last Saturday: (1) HP's planned reduction in telecommuting, (2) Technological threats to the continued relevance of corporate marketing departments, and (3) Increasing incompatibility in how individual web based accounts are handled.

How Secure are Secure Facilities?

One of the things I've learned from reading and listening to the thoughts of my friend Martin McKeay, a security expert, is that the best technology can be undone by poorly or inconsistently implemented processes. I thought about this over the weekend when I drove a friend of mine from Alexandria to the National Institutes of Health campus in Bethesda, Maryland.