Close dialog
 
gigabitblog

Gigabit Thinking

A blog that explores what’s possible. Are you ready?

       

Showing   - to   of   results

Clear

SDNs and NFV are complementary and core components of modernized networks

Software-defined networking and network functions virtualization both untie tasks and functions from hardware and provide agility, one for the network itself, the other for network services.

Complexity a killer when it comes to digital transformation success

To reduce the complexity of a digital transformation initiative, think of it as a collection of smaller pieces, not one monster application or infrastructure, advises Mihai Strusievici, director of IT, North America at Colliers International.

Overseas ambitions: global companies capitalising on Middle Eastern promise

Find out key factors to consider when applying digitalisation across a vibrant and fast-changing part of the world

Next Generation Firewalls – are they still relevant?

Next generation security technologies like Next Generation Firewalls (NGFW) are still relevant, however in such a rapidly evolving security landscape, vendors will need to collaborate in order to achieve long-term success.

IT teams are drowning in data – throw them a lifeline

As the trends toward cloud migration and a remote workforce continue to obscure network visibility, IT issue resolution is becoming increasingly complex. How can IT teams make use of smarter analytics to speed up troubleshooting?

A Brief History of Security

What is security? When can we feel truly secure? Securing data has been around since Julius Caesar’s reign, but his methods could hardly stand a chance against hackers. Security evolves rapidly to combat the known, but what happens when facing the unknown?

It’s time to take cyberbullying seriously to halt its spread

With the rapid increase of social networking sites, online activity and messaging apps, cyberbullying is also on the rise. l. While traditional bullying, when at school, can be stopped on the playground or in the classroom, cyberbullying continues outside of school hours for children and often continues into adult life and even the workplace.

Sourcing cyber security skills

Sourcing cyber security skills. There is no single answer but there are steps you can take. It will cost you money, it will take time, but it is still a small price to pay for staying ahead of those who lose out on top talent.

Using data to cross the finish line

In today’s technology-driven business landscape, many organizations understand that data is the currency of digital transformation – yet very few look beyond the traditional sources of information. Here is how enterprises can gain inspiration from the sports industry.

Google Plus