riverrun research | beta

from swerve of shore to bend of bay

links for 2009-03-13

  • We have started the upgrade process, and are rolling the service out to new users on an ongoing basis. When your account is ready to upgrade, you will notice an "Upgrade" message at the top of your GrandCentral inbox.

    Once you choose to upgrade, you will automatically get all the great new features (transcription, SMS, conference calling, cheap international calling, Goog411 integration, etc.), and new voicemail and SMS messages will begin appearing in your Google Voice inbox.

    After you upgrade, any new voicemail messages will appear in your inbox at http://www.google.com/voice, and all of your prior voicemail messages will still be available through your GrandCentral account at http://www.grandcentral.com.

  • Pogue on the shift from Grand Central to Google Voice. "The early adopters, several hundred thousand of them, were able to keep using GrandCentral’s features. But as time went on, their hearts sank. In January, Salon.com summed it up in an editorial called, “Will the Last One to Leave GrandCentral Please Turn Out the Lights?”

    As it turns out, the joke was on them. Google was quietly working on GrandCentral all along. Starting Thursday, existing GrandCentral members can upgrade to Google Voice. In a few weeks, after debugging the system, Google will open the service to all.

    Google Voice starts with a clean, redesigned Web site that looks like an in-box, à la Gmail. It maintains all of those original GrandCentral features — but more important, introduces four game-changing new ones.

  • Gartner, Inc. has revealed its key predictions for identity & access management (IAM) between 2009 and 2011. Speaking ahead of the Gartner Identity & Access Management Summit 2009 in London, analysts have identified forward-looking assumptions around smart-card authentication, identity-aware networks, hosted IAM and out-of-band (OOB) authentication.

    “There is a continuing need in this time of economic uncertainty and budgetary constraints for cost-effective, risk-appropriate IAM methods,” said Ant Allan, research vice president at Gartner. “This includes growing demand for identity-aware networking, host- and service-based IAM offerings and the search for protection from increasingly effective malware attacks against consumer accounts.”

Advertisements

Filed under: delicious

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Post Days

March 2009
S M T W T F S
« Feb   Apr »
1234567
891011121314
15161718192021
22232425262728
293031  

Recent Resources

%d bloggers like this: