Making Public Cloud Migration a Turnkey Process Public clouds are great for managing applications and data without the frustration and expense of supporting the underlying infrastructure. When Frank Yue |April 05, 2017
You Cannot Do Application Delivery Without Security Security is an ever-evolving concept in theory and application. It is important to deploy and leverage technologies that can adapt Frank Yue |March 30, 2017
Trends in Software Defined Data Centers I recently met with a regional cloud service provider (CSP) that has adopted provisioning on demand as their IT model. Prakash Sinha |March 29, 2017
SCADA Part 3: Mission critical, highly vulnerable, almost un-protectable. I’m back with another exciting installment on SCADA security. Today I want to cover authentication and System redundancy.It should be Daniel Lakier |March 23, 2017
Mobile World Congress – Is It Over Yet? Four Days. Four days is what is takes for 108,000 technologists to gather in the enchanting city of Barcelona to Louis Scialabba |March 14, 2017
Network Security Does Not Matter When You Invite the Hacker Inside We build security solutions to protect our networks from the rest of the internet, but do we do anything to Frank Yue |March 09, 2017
Visibility is Key When You Make Apps Go The automobiles in the late 19th and early 20th century did not have a complex dashboard displaying a multitude of Frank Yue |February 22, 2017
SCADA Part 2: Mission critical, highly vulnerable, almost un-protectable. Hey folks, I’m back with my second installment on protecting the un-protectable:Last week we discussed the SCADA environment and some Daniel Lakier |February 16, 2017
When the Application Stops Flowing, What Next? Don’t you hate it when you have a problem, but have no idea what is causing it? The water in Frank Yue |February 14, 2017
Use Application Delivery Technologies to Accelerate and Automate the Boring Tasks Playing a stringed musical instrument like a guitar means that the different strings need to be regularly adjusted to play Frank Yue |February 08, 2017
SCADA: Mission critical, highly vulnerable, almost un-protectable. In today’s world when most of us think about IT infrastructure, we think about the traditional environments that have firewalls, Daniel Lakier |February 07, 2017
Application Virtualization – Seeing the Forest Instead of Trees Virtualization of the application environment is on every business’ mind. Terms like hypervisors, virtual machines, and software defined [insert your Frank Yue |February 02, 2017