Network Security

Network Vulnerability: Ensuring security from a variety of threats

With the new year and new security threats being added to the list of existing ones, the IT world is increasingly pushing to prioritize security, high availability, and disaster recovery for...
AI wireless network

Strategies for integrating Artificial Intelligence with Wireless Networking

Artificial Intelligence (AI) technology is poised to impact business and personal communications and transactions almost universally in the coming years and beyond, and at no point is it’s value more apparent...
VPN

VPN and the Remote Employee Model – A Cost/Benefit Analysis

It’s an old adage in business that there’s no such thing as a true win-win situation. In every model, there are always positives and negatives, and the goal is to maximize...
Formal Network Verification

Using mathematics to predict the future

In the world of networks, a recent push toward software-based architecture has resulted in enormous changes to processes enterprise-wide. One of the most significant changes has been the implementation of automated...
encrypted traffic

Cisco Develops New Network That Can Spot Threats in Encrypted Traffic

American multinational technology conglomerate, Cisco recently unveiled new intent-based networking solutions, that use advanced automation and machine learning to control networks. The network solutions – which were years in the making...

APPLICATIONS

Practical Uses for Augmented Reality are Coming

The different ways people are using augmented reality (virtually imposing digital images onto a physical scene) and Apple’s new ARkit has been fascinating. From...
North Korean ATM hacking

Another North Korea Deja Vu

HOT NEWS