The big myth about security patch management

“If we had just kept our systems patched, the malware wouldn’t have been a problem.” After every major breach you usually hear those words echoed across news media. You might even pause for a […]
Read More

Humanize Your Wi-Fi with End-User Experience Visibility

Wi-Fi and mobile access is the heartbeat of today’s society. We connect and communicate with our mobile devices all the time, for our business activities and personal engagements. As a user, we […]
Read More

Edge and fog computing: Key to safer streets? (Part 3)

In parts one and two, we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing and how they may be the key to smarter cities. In our third and […]
Read More

Malware strain infects 200k more devices

Yet another global malware infection has been making headlines and the story just took a turn for the worse. When the news of VPNFilter broke, experts warned that 500,000 devices were already […]
Read More

Workplace app overload and its ill effects

Apps are supposed to make life easier in the workplace. But if you use too many of them working at one time, things can get messy. This is a familiar problem in many small businesses that rely on […]
Read More

Highlights from the Apple WWDC 2018

Apple’s yearly Worldwide Developers Conference (WWDC) has come to a close. Engineers from Apple met and exchanged ideas with developers in the event, while consumers looked forward to updates on […]
Read More

Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS […]
Read More

Upstream Without a Paddle: What CIOs Need to Know About AI

Most of us are familiar with the saying “upstream without a paddle”. This is an unfortunate event, where one finds themselves without the proper resources. I have witnessed this exact phenomenon […]
Read More

5 Things You Need to Know about Webex Meetings

Webex has come a long way. We recently unpacked a lot of great innovation in the new meetings experience. The great thing about Webex Meetings is that it’s a full video and content-sharing cloud […]
Read More

The Network Reliability Engineer's Manifesto

The industry is at a crossroads. And this isn’t just hyperbole - we as an industry have some decisions to make around what we stand for - as engineers, operators, and architects, and frankly, the […]
Read More

Why a Big Data Approach is Key for APM

There has been some debate about whether a big data approach is relevant to application performance monitoring (APM). Some experts claim that sophisticated analytics and sampled data are more than […]
Read More

VPNFilter: a global threat beyond routers

When first publicly announced on May 23, the threat dubbed VPNFilter was thought to only infect some brands of home routers and Network Attached Storage devices. While it was known that the list […]
Read More

The Cable Story, Part 4: Automating the Network

This is the last of my “Cable Story” blog series, and what better way to finish it other than discussing automation? Why, because it stands to be the most important thing that service providers […]
Read More

Working remote? Use VoIP

The workplace has been steadily evolving, and much of this is fueled by the rise of remote workers. Last year’s Gallup survey showed that of more than 15,000 adults asked, 43% of them worked outside […]
Read More

Edge and fog computing: Cutting through the haze (Part 1)

Michael Crichton’s 1973 sci-fi movie, Westworld, may be where the initial concept of edge and fog computing (as well as the computer virus) first came to life. In the film, androids appeared to […]
Read More

The Cable Story, Part 2: Thoughts on How to Reinvent the Cable Network

In my previous post, I talked about the ‘cable story’ and the steps service providers need to take, today, in order to leverage their competitive asset – the cable network — and to gain tactical […]
Read More

"Black Dot" crashes iOS messaging app

An emoji encrypted with a series of hidden codes has been reported to disable and crash the messaging apps of Apple Macs, iPads, and iPhones. Read on to discover how you can address this problem […]
Read More

Data-Driven Hacks Part 2: How Can You Master the Past to Own the Future?

In my previous blog, I introduced the fact that real time isn’t always enough. In many cases, real-time data leads to reactive decisions. Not very conducive in our ever-evolving digital world.
Read More

What to tweak when setting up Windows 10

There are things that need to be done after unboxing a new laptop. After installing Microsoft's Windows 10, you need to unlock its full potential by tweaking some important settings. The best thing […]
Read More

Why is intent-based networking good news for software-defined networking?

In a previous blog post Cisco Engineering teams looked “under the hood” at intent-based networking. A common question we receive is: “What is the relationship of software-defined networking […]
Read More

A Primer on Jamming, Spoofing, and Electronic Interruption of a Drone

What does it mean to “jam” or “spoof” a drone? What’s the difference?
Read More
1