We all know we need it, but no one wants to talk about. Today, we break through that taboo. Secure the Infrastructure! This bold declaration brought to you courtesy of Matthew Brender (@mjbrender) and Mike Foley (@mikefoley) as th...
In today's world of the Internet of Everything (IoE), we are changing the expectations of customer experiences. Through wearable technology, wireless location-based services and even video analytics, companies can customize every ...
The HIPAA Omnibus Final Rule is now in effect and audits will continue in 2014. The Department of Health and Human Services' Office for Civil Rights has stated several times that both Covered Entities and Business Associates will ...
Cisco's newest 802.11ac product, the Aironet 3700 Series Access Point is now orderable and shipping in the next few weeks. The AP 3700 features an integrated 11ac radio with a 4
The web browsing behaviour of users changes as the end of the year approaches. The holiday season can provide a large distraction from work duties that may need to be managed. Equally, even during periods when the office is closed...
This was the title of a November 19 2013 panel that I had moderated in Washington D.C. at the MPLS-SDN Isocore Conference. The abstract for this conference was designed to be a bit provocative, specifically: " Virtualization ...
Securing the Critical Internet Infrastructure is an ongoing challenge for operators that require collaboration across administrative boundaries. Last September something exceptional happened in Ecuador, a small South American coun...
By now, given all the launch and blogging activity activity over the past week or so, I am sure your understanding of and interest in Application Centric Infrastructure (ACI) will have grown. Many of you will be asking...
Previously, we saw how Boeing division (BDS)andUniversity of Siegen have deployed Multi-hop FCoE and realized significant benefits. This blog highlights similar benefits achieved by Engineering Shared Infrastructure Services ...
As the day draws to a close, and especially during the early morning, users become far more likely to click on links that lead to malware. Those responsible for network security need to ensure that users' awareness of information ...
Today's guest post comes from Dr. Joshua Hursey, an Assistant Professor in the Computer Science Department at the University of Wisconsin, La Crosse. For a number of years, developers tuning High Performance Computing (HPC) appli...
What will the future be like? As depicted in today's popular movies and books, the future is either one of bright promise-where the world's greatest problems have been solved by technology and greater human enlightenment-or it's a...