The cloud and virtualization, simplified

Cloud computing and virtualization are similar but not interchangeable. Both have their own benefits, so it’s worth learning how each technology works. With this knowledge, you can make the most out […]
Read More

Mist Deployment (First Part)

First in a series about our first deployment of a Mist Systems wireless network. 
Read More

On-Prem vs. Public Cloud Deployments Differences & Similarities – DevOps Series

Find previous blogs in Julio’s DevOps series.
Read More

Cloud Unfiltered, Episode 46: Succeeding with Cloud, DevOps, and Big Data Initiatives

Do you ever wish you could just bring someone in that would tell you how to do this whole cloud thing right? A person with the expertise to explain where you should focus your energy, which […]
Read More

The lifespan of a business phone system

Today’s technology allows customers to engage with brands and companies across a broad range of platforms and mediums. But the telephone still remains an essential communication tool for businesses. […]
Read More

VPNFilter: a nation state campaign for surveillance and destruction

VPNfilter is a campaign to compromise small office and home routers as well as Network Attached Storage devices from several popular manufacturers. According to a Cisco Talos blog, there are […]
Read More

The future of Android at Google I/O 2018

Google's major conference has come and gone. Its keynote speech gives consumers a sneak peek at Google Assistant and the next version of Android. This will help developers get their integrations, […]
Read More

Practical tips for preventing Ransomware

Crypto ransomware seems to be a never-ending threat in today’s cyber world. It’s comparable to the “Kaiju” in the 2013 Hollywood blockbuster, Pacific Rim. One crypto ransomware dies and another is […]
Read More

The New Cisco Webex Teams Experience Starts Today

Team collaboration. Sounds redundant. Isn’t collaboration inherently about teams working together? Isn’t every team interaction about getting things done?
Read More

How to stop VoIP theft of service

As the use of Voice over IP (VoIP) phones becomes more widespread, so too do security threats against it. And the most common type of VoIP fraud? Theft of service. Let’s examine how it affects your […]
Read More

Service Models and Automation are Transformational

As a member of the Tail-f Engineering team at Cisco, I have been fortunate enough to spend the last couple of years together with customers that have taken on using our NSO product as a […]
Read More

GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must […]
Read More

IDC analyst Part 1: How to make multi-cloud work for government

Guest Blogger: Adelaide O’Brien, Research Director, Government Digital Transformation Strategies at IDC
Read More

6 AI Ingredients Every Wireless Networking Strategy Needs

Thanks to advances in AI, companies of all sizes can transform their wireless networking with WiFi that is predictable, reliable and measurable. Artificial intelligence is all the rage these days. […]
Read More

Be Smart and Back Up Your Valuable Data

Storing copies of your business data in the cloud will help you avoid the risks associated with broken hard drives, lost or stolen devices, and human error. That’s because entrusting your data to an […]
Read More

Striking the Balancing Act Between Agility and Security in the Cloud Era

For today’s digital businesses, cloud-first transformation is in full effect. I think it’s obvious why this is happening—a cloud-first mindset enables unlimited scalability, agility, efficiency […]
Read More

Balancing the Desire for Location Analytics with User Privacy

The Impact that MAC Randomization has on Location Analytics Introduction Bluetooth is a wireless personal area networking standard for exchanging data over short distances. Bluetooth low energy (BLE) […]
Read More

5 tips on keeping mobile workers connected

Due to increasing connectivity and technological advances, mobile workers are increasingly becoming the norm in almost every industry. Business owners need to ensure these workers stay connected, so […]
Read More

Greater Wi-Fi Adoption brings the need of higher security

Over the last few years, Wi-Fi has become the primary mode for network access. This is especially true in the consumer market where the rapid adoption of Smart Home technology, streaming media and […]
Read More

Browser-Based Biometrics Boosts Security

Earlier this month, the World Wide Web Consortium, announced plans to begin allowing users to log into online accounts with fingerprints, facial scans, and voice recognition. This will not only boost […]
Read More

The Data-Driven Hacks You Need Now to Be Proactive (Part 1)

Imagine this. You receive a notification that the nuclear power plant you work in is about to explode. You’re in the plant’s breakroom—dead center in the building. Isn’t it a little too late to […]
Read More

Third-party Integrations Simplify Webex Meetings

We know that the canvas you work in includes many different collaboration tools, productivity tools, and devices. When all those elements work together, you can work more efficiently. That’s why […]
Read More

Leveraging AI Across the Whole IT Stack

As we celebrate the 30 year anniversary of one of the networking industry’s most prolific standards, 802.11, I can’t help but think about what new standards will drive the adoption of IT for the next […]
Read More
1