BLOG
You Get What You Pay For
You get what you pay for. How many times have you heard that expression? There’s another expression that says there are three things in most transactions, low price, quick service or good quality; you get to pick two of these three, while someone else decides the...
Construction Management Meetings – when is enough, enough?
In our last blog post we touched on the issue of defining scope, or more precisely, accurately defining scope. We suggested this was important on two fronts. Accurately defining what you want done on a construction project seems a no-brainer, however based on some...
Scope – What’s included and what isn’t? Crucial questions to consider in writing your RFP.
Fancom Communications is in the business of offering consulting services in the areas of infrastructure design to support voice, video, data and electronic security applications such as video surveillance and access control. We look for opportunities to pursue on...
Designations – Are they relevant? Are they important?
Fancom Communications Engineering, as a technical design firm, competes for business within the telecommunications industry. Our work stretches across a broad range of verticals, everything from water and wastewater treatment facilities at one end of the necessary and...
Owner’s Responsibility
In the context of building construction, what exactly do these two words mean? Are they important? Well, like so many things, it depends on the situation. If for example we’re referring to IT infrastructure within a building and building owner is a multi-level Cisco...
How Secure are Wireless Links in my Security Network?
Wireless networking is everywhere. It has permeated our day-to-day world so much that we are not even aware when a device connects to a trusted network or when we buy a product with a wireless interface. Networks are never able to be truly secure. As long as a person...
When the Security Network becomes a Threat to the Corporate Network
If your security network isn’t well secured, what is the risk? In the last installment we went through what an attack on a security network could look like. In this installment we’ll look at the very real question of how the security network could become a vector in...
How secure is my network? Network Security from 10,000 feet.
Imagine waking up in the middle of the night wondering what would happen if someone, at that moment, was in your corporate network. Visions of some teenager in a hoodie crouched over a laptop posting your intellectual property on a forum somewhere or putting your...
Rewiring our Wi-Fi Terminology
A few days ago I attended my first webinar hosted by iBwave that centralized around the need to adjust vocabulary and terminology when it comes to talking about Wi-Fi. Wi-Fi expert Alan Blake discussed the issues arising in the IT world as a result of the misinformed...