Filter by: Latest Video

Screen Shot 2015-03-30 at 12.30.10 PM

Patching or IPS

by |

I heard a question the other day that caught me off guard. “Why do you guys even sell IPS (Intrusion Prevention Systems), is there even value in that anymore? Shouldn’t you just recommend patching vulnerable systems?” 

Blog 3.27

What If the Future Did Not Include IT as You Know It?

by |

I think the classic IT model we are accustomed to today is slowly transforming – and will be mostly marginalized.  In fact, a very clear picture of the replacement of how to run IT is here now.

We are used to buying packaged software or even developing in-house software for operating systems, clustering, networking, firewalling, load balancing and a myriad of other services put together.  As companies develop new software, we should expect to drift further away from our traditional roots and those packages.  You already see the falling and failing of IT’s boundaries with today’s current iteration of “shadow IT.” 

blog mobility

Six Ways to Reduce Mobility Pain

by |

Mobility offers businesses unprecedented opportunities to improve performance and gain a competitive edge. With the right mobile capabilities in place, staff can better engage with customers, boost productivity, streamline collaboration and increase revenue.


Top 10 Must-know Video Conferencing Vocabulary Terms

by |

There are SO many choices when it comes to video conferencing, and with choices come WORDS!  You might ask, “What do all these terms mean and how are they relevant to me?  I just want a video conferencing solution that works for my users and me!”  I’ve been asked so many times about this and thought, “Why not put together a list of 10 must-need-to-know terms in the world of VC.” 


Bluetooth Low Energy – What It Is, Isn’t and How It Enables Location-Aware Applications

by |

My favorite aspect of being a wireless solution architect is how incredibly dynamic this space remains.  My second favorite part about working in wireless is the direct touch these technologies have with end users.  The only similar technology would be voice, but everyone already takes voice services for granted.  Luckily, for me, we’re not quite there yet for wireless services.

lead image (1)

10 Rugged Computing Advantages

by |

Technology users today push the limits of their equipment to the edge and beyond to get the job done. Manufacturers go to great lengths to design devices that will rise to the challenge. (See: Panasonic’s “Rube Goldberg Machine” Ultimate Torture Test.) From oil rigs off the coast of Texas to Alaska State Troopers, all across the country we find examples of rugged technology performing far beyond the limits of consumer equipment.


SQL Conversion: One Final Reminder

by |

You’ve probably noticed a number of SQL-licensing-related blog posts here on the Solutions Blog recently. That’s for good reason. As I mentioned in my last post, the majority of all Enrollment for Application Platform (EAP) contracts are set to expire at the end of this month (March 2015). I went on to discuss a potential “gotcha” in the form of “Deferred L” SKUs.