About
I operate at the boundary where enterprise architecture becomes strategic foresight. I…
Articles by Ken
Activity
-
WE DIDN'T FAIL AT AI. WE FAILED AT WHERE WE PUT IT. Over the last two years, companies have invested tens of billions into generative AI. The result…
WE DIDN'T FAIL AT AI. WE FAILED AT WHERE WE PUT IT. Over the last two years, companies have invested tens of billions into generative AI. The result…
Shared by Ken Camp
-
Technology failure is rarely caused by a lack of motion. It is usually caused by too much motion with no control tower. Projects take…
Technology failure is rarely caused by a lack of motion. It is usually caused by too much motion with no control tower. Projects take…
Liked by Ken Camp
-
The most dangerous decision in enterprise technology isn’t the wrong one. It’s the one nobody made. In complex organizations, decision avoidance…
The most dangerous decision in enterprise technology isn’t the wrong one. It’s the one nobody made. In complex organizations, decision avoidance…
Posted by Ken Camp
Experience
Licenses & Certifications
Publications
-
Enhancing Government Services Through Unified Communications
Realtimepublishers
See publicationThe Shortcut Guide to Improving Government Services Through Unified Communications focuses on four facets of unified communications technologies in terms of the value and impact each brings to government services at the local, state, and federal levels. This informative new book reviews how self-service applications can improve customer satisfaction, increase revenue, decrease costs, and enable resource sharing across government agencies. It uncovers the value in teleworking programs and…
The Shortcut Guide to Improving Government Services Through Unified Communications focuses on four facets of unified communications technologies in terms of the value and impact each brings to government services at the local, state, and federal levels. This informative new book reviews how self-service applications can improve customer satisfaction, increase revenue, decrease costs, and enable resource sharing across government agencies. It uncovers the value in teleworking programs and technologies. It explores contact center solutions to improve communications both internally and with citizens. And lastly, this book addresses how government officials and organizations are using emerging social media networking tools to provide enhanced services to citizens.
-
Definitive Guide to Converged Network Management
Realtimepublishers
See publicationThe convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations are implementing VoIP in an effort to cut communications costs or leverage the competitive advantage of integrated services. VoIP implementers focus on issues of voice quality, and interoperability – important factors in the delivery of Quality of Service (QoS). In the integrated services environment, voice security needs to be treated as data security. And data security needs to…
The convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations are implementing VoIP in an effort to cut communications costs or leverage the competitive advantage of integrated services. VoIP implementers focus on issues of voice quality, and interoperability – important factors in the delivery of Quality of Service (QoS). In the integrated services environment, voice security needs to be treated as data security. And data security needs to be treated as voice security.
The Definitive Guide to Converged Network Management highlights the overall service management challenges facing enterprise and identify common industry best practices for effectively managing an integrated, unified communications environment using VoIP. It offers a series of systematic and holistic techniques for managing the total integrated network to ensure a consistent service delivery and support for ongoing business operations. -
VoIP Security in the Enterprise
Realtimepublishers
See publicationThe convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations that are implementing Voice over IP (VoIP) in an effort to cut communications costs or leverage the competitive advantage of integrated services shouldn’t overlook the security risks that arise as voice and data converge.
VoIP implementers often focus on issues of voice quality, and interoperability—important factors in the delivery of Quality of Service (QoS). VoIP security is…The convergence of voice and data networks has been evolving and gaining momentum for several years. Organizations that are implementing Voice over IP (VoIP) in an effort to cut communications costs or leverage the competitive advantage of integrated services shouldn’t overlook the security risks that arise as voice and data converge.
VoIP implementers often focus on issues of voice quality, and interoperability—important factors in the delivery of Quality of Service (QoS). VoIP security is a challenge that is inextricably linked with issues such as interoperability with data networks and QoS. To deliver integrated services effectively, organizations must adopt and combine industry best practices from both the voice and data environments. Both technologies bring approaches and management techniques that benefit the other.
This guide will highlight the pressing security concerns facing enterprise deployments. The chapters that follow will identify some of the industry best practices and techniques for creating an effective VoIP security plan that balances network security against the VoIP requirements for availability, reliability, and performance. A systematic and holistic approach to managing integrated network performance and security includes working with vendors, service providers, and trusted business partners to ensure that a comprehensive approach to s -
IP Telephony Demystified
McGraw-Hill
See publicationIP (Internet Protocol) telephony is simply voice sent over the internet, rather than the traditional phone system. IP telephony has the potential to lower long distance rates by a factor of ten, and can combine voice and data services. IT people are being asked to implement or investigate IP telephony solutions. Small companies are looking to economize by adopting it. Everyone is wondering what IP telephony can do for them. This book will demystify IP telephony for both business people and…
IP (Internet Protocol) telephony is simply voice sent over the internet, rather than the traditional phone system. IP telephony has the potential to lower long distance rates by a factor of ten, and can combine voice and data services. IT people are being asked to implement or investigate IP telephony solutions. Small companies are looking to economize by adopting it. Everyone is wondering what IP telephony can do for them. This book will demystify IP telephony for both business people and technology generalists. These people need to understand why to either embrace or shun IP telephony for their individual needs, this book will give them the information to do just that.
Organizations
-
Infragard
Member
- Present -
Internet Society
Member
- Present -
IETF
-
- Present -
ASTD
Member
- Present
Recommendations received
7 people have recommended Ken
Join now to viewMore activity by Ken
-
As a quantum security vendor and FIPS 203 validated solution provider, I’d be remiss not to comment on the first reported ransomware family using…
As a quantum security vendor and FIPS 203 validated solution provider, I’d be remiss not to comment on the first reported ransomware family using…
Liked by Ken Camp
-
AI is not a category, it is a transformation of how every existing function operates.
AI is not a category, it is a transformation of how every existing function operates.
Posted by Ken Camp
-
Tyto Athene is the sole federal SOCaaS provider approved by the cyber Quality Service Management Office at DHS CISA. That distinction reflects years…
Tyto Athene is the sole federal SOCaaS provider approved by the cyber Quality Service Management Office at DHS CISA. That distinction reflects years…
Liked by Ken Camp
-
Securing #OT is finally becoming a must! Xage Security can help you on your journey to compliance while ensuring the resiliency of these critical…
Securing #OT is finally becoming a must! Xage Security can help you on your journey to compliance while ensuring the resiliency of these critical…
Liked by Ken Camp
-
Fascinating agent based simulation of building a product using an org structure based on the famous org chart meme.Although the “cultural overlay”…
Fascinating agent based simulation of building a product using an org structure based on the famous org chart meme.Although the “cultural overlay”…
Liked by Ken Camp
-
Most enterprise architectures were not designed. They accumulated. That is not always a failure. Systems that evolved through a thousand tactical…
Most enterprise architectures were not designed. They accumulated. That is not always a failure. Systems that evolved through a thousand tactical…
Posted by Ken Camp
-
🔐 The quantum threat isn't future — it's now. Adversaries are harvesting encrypted data today to decrypt later. Federal agencies must build…
🔐 The quantum threat isn't future — it's now. Adversaries are harvesting encrypted data today to decrypt later. Federal agencies must build…
Liked by Ken Camp
-
Cloudflare just did something important. Not incremental, not experimental, but foundationally important. In response to recent research from…
Cloudflare just did something important. Not incremental, not experimental, but foundationally important. In response to recent research from…
Liked by Ken Camp
-
Proud to see the continued momentum in cybersecurity and compliance innovation supporting critical government use cases. Huge credit to the teams…
Proud to see the continued momentum in cybersecurity and compliance innovation supporting critical government use cases. Huge credit to the teams…
Liked by Ken Camp
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content