IoT: Living on the Edge

By Kevin Meany on Jan 8, 2019 10:57:00 AM

Where is your data when you need it? Edge computing offers an alternative to processing all data in the cloud or the data center.

Continue Reading

Six Recommendations For Securing Data Center Networks

By Kevin Meany on Dec 18, 2018 10:23:00 AM

A wireless network can pose a threat to any company. WiFi signals extend way farther than the walls of our offices, and thus a hacker with simply a strong antenna can easily connect to a company’s WiFi from the outside. Once a hacker finds a way into the company’s network, file shares without protection or computer accounts that have easy to figure out passwords become an easy pathway for access to other sensitive information.

Continue Reading

Stay Relevant with a Solid Digital Transformation Strategy

By Jennifer Hooper on May 18, 2017 8:00:00 AM

In previous blog posts, we talked about why organizations should be exploring and understanding the role of digital transformation in attracting and retaining customers, and why CIOs and CMOs should be forming close partnerships. This blog post is all about staying relevant. It’s part 3 of a 3-part series about digital transformation.

In today's digital world, organizations need to put customers at the center of their digital transformation strategies. It means understanding customers' purchasing behaviors and desired digital experiences and building strategies around them. If your organization can't meet—or surpass—your customers' expectations, another organization will.

Continue Reading

Grab a Seat For SURPASS!

By Jennifer Hooper on May 15, 2017 10:51:23 AM

At SURPASS, you’ll connect with Versatile technologists and consultants, industry experts, solution partners and like-minded IT leaders for education, inspiration, collaboration and more. The event will serve as a launchpad for you to start considering—or continue honing—your digital transformation strategy. We’re thinking about your organization’s future and want to make sure you are too!

Continue Reading

5 Key Takeaways from Cisco Live 2016!

By Richard Purizaca on Aug 5, 2016 1:29:33 PM

By Richard Purizaca *

From the opening keynote speech by Cisco CEO Chuck Robbins, who energized the crowd with a wealth of information, to the closing notes by Kevin Spacey, who keyed up pure excitement as he conveyed how "your journey” and “your story” empowers your brand and separates you from your competitors, Cisco Live 2016! was an incredible event. Other themes that emerged throughout the event included be the differentiator and challenge the norm, break barriers and keep reaching. But in my field of Engineering and Architecture, my favorite subjects fell within the Engineering Design, Network Security and Architectural space. Here are 5 key takeaways announced at Cisco Live 2016!

Continue Reading

IT Roundtable. Knights Wanted.

By Jennifer Hooper on Jun 6, 2016 4:41:48 PM

As CIO, IT Director, or Security Specialist you already know that vulnerabilities on your network are targets for exploitation. What about industry compliance? Keeping up with security concerns is a never-ending process. Are you doing enough? Have you addressed all the pain points? IS your network secure?

Continue Reading

5 Considerations for a Solid Security Strategy

By Jennifer Hooper on May 23, 2016 11:54:56 AM

Stolen credit cards. Ransomware extortion. Corporate espionage. Every week, there’s a story in the news about a security breach at a major corporation. Last week, hamburger joint Wendy’s announced a malware infection, joining a growing list of organizations that have suffered from security compromises including Home Depot, Target, Neiman Marcus, and others.

Continue Reading

Lists by Topic

see all

Posts by Topic

see all

Recent Posts