Today the web is a favorite vector for threat actors to launch their attacks. According to the Cisco 2014 Midyear Security Report, More than 90 percent of customer networks observed in the first half of 2014 were identified a...
Much like the MPG argument when comparing diesel engines versus regular gas engines, and hybrid gas/electric versus pure plug-in electric vehicles, similarly valid arguments can be made for any combination of IT strategies: the tr...
These days, it's hard to keep up with the flood of cool technology and cutting-edge products coming to market. It used to be my passion; now it's also become my career. Turns out, all those hours on Reddit and TechCrunch were a go...
"The agreement between the United States and China to expand the scope of the Information Technology Agreement represents a major breakthrough in the global trade agenda. This agreement is expected to eliminate duties on over 200 ...
So over the past year, there has been lots of press about the Internet of Things (IoT) and there has been information on the Connected Car and Telematics, Connected Transportation, Connected City, Connected Everything... But just ...
This month Microsoft is releasing 14 security bulletins. Originally they had planned to release 16, but due to issues that emerged in late testing, two bulletins that were announced in the Advance Security Notification, MS14-068 a...
In my first blog, I discussed telco customer challenges and the new architectures they are considering. On my way back from Johannesburg, South Africa, I am writing this companion blog discussing how we're helping telco...
DevOps is gaining momentum in many enterprises today. Customers are increasingly realizing the benefits of DevOps and how it helps in breaking down barriers and helps application agility. DevOps enables a constraint free developme...
We thank all of those serving or who have served in the U.S. military. We live freely today because of your sacrifice. The holiday season has always been a time for family and gratitude. And it is fitting that we thank and honor o...
Mention Network Access Control (NAC) to some security or network operations engineers, and they just might grimace. Why? Most people still associate NAC with a set of technologies that were complicated to deploy and im...
Last month, I had the honor of presenting at the Internet of Things (IoT) World Forum in Chicago. The event gave me the opportunity to do one of my favorite things, collaborate and network with all of my peers who are doing creati...
The challenges of data management are getting exponentially harder. These ever-increasing data quantities, diversity and distribution are revolutionizing data management, opening the door for new solutions such as data virtualizat...