Ken Dulaney
Ken Dulaney
hackers horse network software system uses
Hackers could infect your system or network with software that uses the PDA as a Trojan horse to get into the enterprise,
believe company guys proud
These guys are a proud company. Once they believe in something, they don't take it lightly.
ask business interest people pocket uses video wireless
I'd say there's no business interest in wireless video today. Ask yourself why no one uses those little pocket TVs. Not enough people like it.
ask business interest people pocket uses video wireless
I'd say there's no business interest in wireless video today, ... Ask yourself why no one uses those little pocket TVs. Not enough people like it.
client couple delete example hardware hundred phone software truly
The hardware just isn't truly competitive just yet and the client software is feature-poor. For example, if I get a couple hundred e-mails on my phone I have to delete them one by one by one. Real pain.
built enterprise front great swiss
You've built this great firewall in front of your enterprise, but the back of your enterprise is like Swiss cheese,