Resources
Information, Innovation, Insight, and Client Success Stories!

4 min read

VPNFilter: a global threat beyond routers

When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known that the list of router brands was probably not complete, little did...

Read More

2 min read

The Cable Story, Part 4: Automating the Network

This is the last of my “Cable Story” blog series, and what better way to finish it other than discussing automation? Why, because it stands to be the...

Read More

2 min read

Working remote? Use VoIP

The workplace has been steadily evolving, and much of this is fueled by the rise of remote workers. Last year’s Gallup survey showed that of more...

Read More

3 min read

Edge and fog computing: Cutting through the haze (Part 1)

Michael Crichton’s 1973 sci-fi movie, Westworld, may be where the initial concept of edge and fog computing (as well as the computer virus) first...

Read More

2 min read

The Cable Story, Part 2: Thoughts on How to Reinvent the Cable Network

In my previous post, I talked about the ‘cable story’ and the steps service providers need to take, today, in order to leverage their competitive...

Read More

1 min read

"Black Dot" crashes iOS messaging app

An emoji encrypted with a series of hidden codes has been reported to disable and crash the messaging apps of Apple Macs, iPads, and iPhones. Read on...

Read More

2 min read

Data-Driven Hacks Part 2: How Can You Master the Past to Own the Future?

In my previous blog, I introduced the fact that real time isn’t always enough. In many cases, real-time data leads to reactive decisions. Not very...

Read More

2 min read

What to tweak when setting up Windows 10

There are things that need to be done after unboxing a new laptop. After installing Microsoft's Windows 10, you need to unlock its full potential by...

Read More

2 min read

Why is intent-based networking good news for software-defined networking?

In a previous blog post Cisco Engineering teams looked “under the hood” at intent-based networking. A common question we receive is: “What is the...

Read More

2 min read

A Primer on Jamming, Spoofing, and Electronic Interruption of a Drone

What does it mean to “jam” or “spoof” a drone? What’s the difference?

Read More