It’s no secret, Cisco has been evolving into a software company. Senior Systems Engineer, David Hasfurter explores Cisco's recent moves to the software market touching on subjects like Cisco Webex teams, DNA, Cisco Collaboration Flex Plan and more.
The last time that I went to Cisco Live it was called Networks, and that was over 15 years ago. A lot has certainly changed since then!
Speaking of change. Cisco is going through a company-wide change of culture/philosophy. I understand that change is constant, but these changes go to the core of the company’s beliefs. We need to understand these changes in order to move forward.
From intimate networking opportunities with top technology vendors like Cisco, Dell and Spectrum, to an educational agenda driven by IT peers – NY Tech Summit is unlike any other conference out there. With 25+ educational sessions, it is impossible to attend every class offered. But there are four sessions at this year’s conference I’d like to draw your attention to. Gartner recently released a paper titled, “Top 10 Strategic Technology Trends for 2018 [ID: G00327329].” The four sessions below relate directly with some of the trends Gartner describes in its research paper.
David Hettrick, Market Development Manager takes on all things VMware. He discusses recent reports of Dell taking over full ownership of VMware, as reported by CRN. What questions does this raise? In other VMware news, there are important End of support and sales dates in 2018 customers should be aware of. Finally, Hettrick covers the latest in new Veeam subscriptions.
While most vendors have provided patches and workarounds to mitigate this security issue, I wanted to expand on wireless security overall. As a quick background, I have been in wireless for over 10 years and have seen lots of security methods come and go. I have dealt with network engineers that have told me they need to have complete security for the wireless, to which my response is “use a patch cord.” The thing to remember is that wireless is easy to attack, since the attacker does not need to be inside the facility, just within range of the wireless signal to perform the attack.