My Photo

Your email address:

Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« Out-bound Record-level Accountability in Information Sharing Systems | Main | Data Decommissioning – Destruction of Accountability »

January 02, 2008


Feed You can follow this conversation by subscribing to the comment feed for this post.

Jim Harper

You must have listened to my podcast yesterday. Nice work, Grasshopper.

Carl Kessler

Is it feasible to have a pool of "throwaway" cellphone numbers (or at least a couple) that map to a single cellphone, but which you can control (e.g., time out or cycle through)?

The analogy is my home alarm system. There's a master code, but my cleaning person has a throwaway code. It let's them in, but allows me to track their entry separately and turn off whenever I like.

The same for cellphones would be great - I could cycle through 2 or 3 throwaway numbers and know that my primary cell number isn't out there...


bit like throwaway email addresses but some last longer than others for some reasons. Some sites have better spam traps :-)

Verify your Comment

Previewing your Comment

This is only a preview. Your comment has not yet been posted.

Your comment could not be posted. Error type:
Your comment has been saved. Comments are moderated and will not appear until approved by the author. Post another comment

The letters and numbers you entered did not match the image. Please try again.

As a final step before posting your comment, enter the letters and numbers you see in the image below. This prevents automated programs from posting comments.

Having trouble reading this image? View an alternate.


Post a comment

Comments are moderated, and will not appear until the author has approved them.

Your Information

(Name and email address are required. Email address will not be displayed with the comment.)