Resources
Information, Innovation, Insight, and Client Success Stories!

6 min read

Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS software as well as the various software that support...

Read More

2 min read

Upstream Without a Paddle: What CIOs Need to Know About AI

Most of us are familiar with the saying “upstream without a paddle”. This is an unfortunate event, where one finds themselves without the proper...

Read More

3 min read

5 Things You Need to Know about Webex Meetings

Webex has come a long way. We recently unpacked a lot of great innovation in the new meetings experience. The great thing about Webex Meetings is...

Read More

5 min read

The Network Reliability Engineer's Manifesto

The industry is at a crossroads. And this isn’t just hyperbole - we as an industry have some decisions to make around what we stand for - as...

Read More

4 min read

Why a Big Data Approach is Key for APM

There has been some debate about whether a big data approach is relevant to application performance monitoring (APM). Some experts claim that...

Read More

4 min read

VPNFilter: a global threat beyond routers

When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached...

Read More

2 min read

The Cable Story, Part 4: Automating the Network

This is the last of my “Cable Story” blog series, and what better way to finish it other than discussing automation? Why, because it stands to be the...

Read More

2 min read

Working remote? Use VoIP

The workplace has been steadily evolving, and much of this is fueled by the rise of remote workers. Last year’s Gallup survey showed that of more...

Read More

3 min read

Edge and fog computing: Cutting through the haze (Part 1)

Michael Crichton’s 1973 sci-fi movie, Westworld, may be where the initial concept of edge and fog computing (as well as the computer virus) first...

Read More

2 min read

The Cable Story, Part 2: Thoughts on How to Reinvent the Cable Network

In my previous post, I talked about the ‘cable story’ and the steps service providers need to take, today, in order to leverage their competitive...

Read More