It’s a jungle out there and predators are homing in on the smell of fresh attack vectors and security vulnerabilities exposed by APIs.
The world of Information Technology is not spared from the agony of the naming process. Discussions involving naming and numbering conventions can turn into…
After five years of hosting this blog on the WordPress platform at my domain registrar, I’ve recently migrated it to static pages generated by Hugo.
Pica8 presented at Networking Field Day 28 to display why their system could be viable for keeping corporate initiatives and supporting IT projects on track.
When swimming upstream against the rushing current of security alerts , accessing APIs may be the only way to avoid being eaten alive.
Onboarding IoT devices is a significant challenge in the industry. It is expensive because it can take anywhere from twenty minutes to several hours…
Use network automation tools to accelerate data collection and manipulation for operating and troubleshooting the old and the new VPN environments.
Mission-critical IT systems that are “rusting out and at risk of failure” present a bevy of risks and problems.
We don’t rise to the level of our expectations; we fall to the level of our training.
The Lean methodology is a philosophy and mindset focused on driving maximum value to the customer while minimizing waste. These goals are accomplished…