Saturday, December 15, 2018
Formal Network Verification

Using mathematics to predict the future

In the world of networks, a recent push toward software-based architecture has resulted in enormous changes to processes enterprise-wide. One of the most significant changes has been the implementation of automated...
AI wireless network

Strategies for integrating Artificial Intelligence with Wireless Networking

Artificial Intelligence (AI) technology is poised to impact business and personal communications and transactions almost universally in the coming years and beyond, and at no point is it’s value more apparent...
DCIM Implementation

DCIM Implementation – Securing C-Suite Buy-In

In today’s economy where keeping current with information management strategy while simultaneously keeping a sharp eye on ROI bottom line, data center infrastructure management (DCIM) solution implementation can be a tough...
network transformation

5 Keys To Successful Network Transformation

The network-centric business model is driving exponential financial growth at small business, corporate, and global economic levels. Using the network-based model, new, innovative businesses thrive, while staple brands, mired in traditional...
cisco crosswork

Managing global service provider networks while coping with massive growth

Cisco expects 27 billion devices and connections will be running on service provider networks by 2021. That means growing pressure on managers to predict change and react in real time, and...
future of virtual reality

Qualcomm and their Snapdragon 845 is the future of VR

Qualcomm has been inventing technology for the world since 1985. Before smartphones or autonomous cars, Qualcomm was laying down a foundation for the future with their groundbreaking technology. Qualcomm has continued...
software bug bounty hunting

A New Type of Bounty Hunter: Google Pays Millions To Find Software Bugs

There’s a new type of bounty hunter out there. The payoff is great, the skill set is limited, and the hunted are bugs. Bounty hunting and the future have officially collided....
NTT Security

Manufacturers Beware

The demand for cybersecurity will certainly rise as a new report by NTT Security sheds some light into growth in cyber threats. NTT Security’s Global Threat Intelligence Center (GTIC) released their...
Western Digital and Toshiba

When Business Relationships Need Couples Counseling

Personal relationships are complex. Business relationships can be even worse. What’s so frustrating about them, is the great opportunity for potential. Two companies, providing goods and services which benefit the other,...
Google Drive service

Yo Ho, Yo Ho, A Pirate’s Life for Google

It’s crowded. It’s only 85 degrees but it feels like 115. Time crawls by as the wait time drops from 90 minutes to 60 minutes to half an hour. Finally, it’s...

APPLICATIONS

Getting Robots To Walk Less Like C-3PO and More Like Luke...

Robot developers have their work cut out for them. Robotics is a field where they will never “arrive”. Even if an engineer has made...

HOT NEWS