In the age of social networks and various more-or-less secure communication tools, it is hard to be at least basically sure that our communication over the Inernet reaches its recipient in unchanged form and confidentiality of such messages is untouched.
It has already been more than fifteen years since Trustica started providing its services in the field of secure communication over untrusted data networks and we are designing solutions for all imaginable variants of such communication. Should you need to secure a communication between your coworkers or ensure the communication with server systems remains confidential, we are at your service and not only we design communication with security on our mind but we also deliver fully functional implementations if requested.■ ■ ■
The Request Tracker system is used for implementing technical or customer support and keeping records of incoming phone, e-mail, web or other requests. With Request Tracker you always have perfect overview about tasks and their requesters, the issue status and which resources are missing for successfully finishing it. Your employees have exact information about requests assigned to them and when are they due.■ ■ ■
Last week we have discussed some of the emerging methods of communication on the early Internet. We covered the means of communication where the primary target was conveying information to single or multiple recipients and where – at least theoretically – the primary communication intent was work- or research-related. Today we see quite the opposite trend where the communication platforms are originally envisioned for free time communication and only later on the companies try to leverage them for some possible profit. If we look at the dawn of time, we can see that this is nothing new.