How Trustworthy Networking Thwarts Security Attacks
The built-in components of trustworthy systems foil attacks before they even begin and limit the damage that they can do given a foothold through unsecure network devices.
Putting the “Trust” in Trustworthy SD-WAN
With ever-more sophisticated threats, network operators must be able to trust that the hardware and software that comprise their infrastructure are genuine, uncompromised, and operating as intended.
Urban Resilience: Engaging your Community through Data
Growing a smarter, more resilient city requires rapid and transparent interaction between government and the people. Increase community engagement by bringing more citizens and more data into the governance process.
The Most Boring Service We offer … And how to bring down a data center in one easy snip!
I do enjoy the (sometimes irreverent!) perspectives of some articles on data center in the UK publication “The Register“, and the story of how a data center change went wrong made me laugh, cringe and cry at the same time – the change being when an electrician cut the wrong wire and brought down a […]
Ten Learnings and Observations from the 2015 London Gartner Data Center Conference (Part 1)
This past week I attended the 2015 Gartner Data Center Conference in London. This is always a great conference to learn from, although it always pays to look out...