Function-as-a-Service 101: What is it?
My favorite part about making a living in the tech industry is that there is always something new to learn. When Amazon Web Services launched in 2006 it slowly began to change they way that people thought about compute infrastructure and software architectures. But what is the next technology on t…
Welcome to the Network: Wi-Fi Wearables
It’s no surprise that wearable devices are increasingly Wi-Fi enabled. With Apple’s recent announcement of Wi-Fi support for Apple Watch and rumors that Google will bring Wi-Fi capabilities to Android Wear, wireless connectivity will continue to drive changes in the way we work and play. As more em…
Get Your WLAN Ready for Google Android L and Apple iOS 8
This fall your wireless networks will experience many devices upgrading to the new Android 5.0(L-release) and Apple iOS 8 releases (cue: IT managers groan). There have now been many blogs attempting to capture the enhancements expected with these releases. Today I am going to focus on describing how…
Big Data: Observing a Phishing Attack Over Years
Overview Phishing attacks use social engineering in an attempt to lure victims to fake websites. The websites could allow the attacker to retrieve sensitive or private information such as usernames, passwords, and credit card details. Attacks of this kind have been around since 1995, evolving in sop…
A Day in the Life of the ecobee Smart Thermostat Part 2
In a previous article I talked about my thermostat and the Internet of Everything [read here] I questioned the true value my smart meter was providing to my home and my wallet. I said what’s missing is a thermostat that helps me understand my energy consumption habits, allows me to stay within…
A Day in the Life of the ecobee Smart Thermostat Part 1
In my last article I talked about my thermostat and the Internet of Everything [read here] I questioned the true value my smart meter was providing to my home and my wallet. I said what’s missing is a thermostat that helps me understand my energy consumption habits, allows me to stay within bu…
Summary: [Cisco Cartoon Catalyst Series] Prime Your Network for the Rise of the Devices
Teachers, students, and staff with their varied wired or wireless gadgets and corresponding application access makes up a daunting sea of devices for any IT professional, whose responsibility is to provide optimized network performance. In his latest blog, Prime Your Network for the Rise of the Dev…
[Cisco Cartoon Catalyst Series] Prime Your Network for the Rise of the Devices
It’s a nightmare out there. School districts’ wireless networks now have to support teachers, students, and staff – all touting desktops, tablets, smartphones, and/or laptops. For some in IT, knowing who is accessing what using what on the network (a confusing statement itself) could very well be c…
[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Pe …
Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing? In his latest blog, K-12 B…
1