This week Aruba, a Hewlett Packard Enterprise Company, announced that the Chase Center, home of the seven-time National Basketball Association champions Golden State Warriors, is using its Wi-Fi 6E access points (APs) to deliver faster, better wireless connectivity.

Read More About
Chase Center Becomes First Sports Venue with Wi-Fi 6E

Earlier this year, I interviewed Jonathan Guy, VP of Engineering for RF Code regarding its new Sentry product, which promises to make management of remote locations easier.

After being briefed on the product, I decided to have the company send me a Sentry device and try it out myself. As a former IT pro, I’m familiar with the challenges that companies have when they need to manage locations with no local IT staff.

Read More About
Remote IT Monitoring Product Review: Code Sentry

Communications provider Mitel has made it a strategic priority to focus on customer lifecycle management (CLM) principles to ensure its customers are getting full value from their investments in its technology.

For Mitel, this is a key initiative as CLM in unified communication (UC) is important in making sure customers are maximizing business value and, at the same time, future proofing themselves. Hybrid work has shifted UC requirements in favor of collaboration platforms that connect people who are dispersed across many remote locations.

Read More About
Mitel Embraces CLM to Add Value to Communications

When you think of Arista Networks, mid-market is not what comes to mind. Yet the provider of software-driven cloud networking solutions for enterprise environments has recently moved into the mid-market to address some of the challenges smaller companies face today.

Read More About
Arista Brings Cognitive Campus to the Mid-Market

Over the past couple of years there has been a significant focus on phishing, ransomware and other threats that attack online users. While this focus is certainly prudent given the rise in those types of activities, it’s important to not take your eye off more “traditional” type attacks, such as distributed denial of service (DDoS).

Read More About
Report: Cybercriminals Use Cloud for DDoS Attacks