Blog

May 24, 2018
BLog List Date Underline

Intelligent Edge Computing - Life at the Edge

by John Macario

The big event (not too long ago) to solve all IT network problems, was the introduction of the “Cloud”. Since more and more systems needed increasing data storage and retrieval – Big Data – capability, and a greater number of devices and users needed to move and/or access that data, the cloud seemed to be the ideal place for accommodating it.

See More > >
May 22, 2018
BLog List Date Underline

Is SD-WAN the Next Big Security Target?

by Chris Kolstad

Bandwidth consumption is growing at a significant clip, and existing communication methods, services, and underlying architectures aren’t up to par with the growing needs. As software-defined wide area networking (SD-WAN) comes of age to cope and support these challenges, it’s a good time to press pause and consider the implications of a fast-growing technology.

See More > >
May 17, 2018
BLog List Date Underline

Is the Theoretical Edge the New White Fluffy Cloud?

by John Macario

Countless marketing departments are at fault for the cloud evoking totally irrelevant visuals of white, fluffy cumulus clouds. As technical professionals, we know this seemingly mystical, dreamy space is really just an ecosystem of physical servers. We certainly don’t have data just floating above our heads.

See More > >
May 15, 2018
BLog List Date Underline

Why Transport Layer Security (TLS) and Secure Real-time Transport Protocol (SRTP) are Crucial for SMB & Enterprise Communications

by Gernot Scheichl

As companies move more of their services online, there is a greater awareness of the need to protect these services from attackers. However, many organizations fail to recognize that different types of data require different approaches to security. This is particularly true of voice traffic, which requires you to take additional steps to ensure it is correctly protected. Failure to secure your VoIP traffic could cause crippling problems for your organization.

See More > >
May 10, 2018
BLog List Date Underline

Edge Computing – Cloud’s silver edges

by Brian Gregory

The cloud vs. the edge

They say, that every cloud has a silver lining.

See More > >
May 08, 2018
BLog List Date Underline

The Far Frontier of UCaaS: Quantum VoIP?

by Brian Gregory

Ordinary encryption methods, such as SSL, have always been breakable. Attackers can usually rely on unskilled or unlucky operators to make a mistake, or they can exploit flaws in the encryption methods themselves. Failing that, adversaries can even decrypt messages using brute force – assuming that they possess an NSA-sized data center.

See More > >
blog-ctabar-img.png

SIP Trunking Survey: Many Don't Have any SBCs