Thursday, January 17, 2019
VPN

VPN and the Remote Employee Model – A Cost/Benefit Analysis

It’s an old adage in business that there’s no such thing as a true win-win situation. In every model, there are always positives and negatives, and the goal is to maximize...
Network Security

Network Vulnerability: Ensuring security from a variety of threats

With the new year and new security threats being added to the list of existing ones, the IT world is increasingly pushing to prioritize security, high availability, and disaster recovery for...
Formal Network Verification

Using mathematics to predict the future

In the world of networks, a recent push toward software-based architecture has resulted in enormous changes to processes enterprise-wide. One of the most significant changes has been the implementation of automated...
network transformation

5 Keys To Successful Network Transformation

The network-centric business model is driving exponential financial growth at small business, corporate, and global economic levels. Using the network-based model, new, innovative businesses thrive, while staple brands, mired in traditional...

APPLICATIONS

Google RankBrain, AI, & Your Business: A Match Made in Heaven

Things at Google are getting more and more interesting in the AI/machine learning world. These days, Google is using AI/machine learning models in its...
NTT Security

Manufacturers Beware

HOT NEWS