Explore
Select a tab
928 results found
Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!
This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025
Demystifying Hotspot 2.0, Passpoint and OpenRoaming the Pros and Cons
The exploration of Hotspot 2.0, Passpoint and OpenRoaming underscores the significance of seamless and secure wireless guest network access while highlighting the associated challenges and available solutions.
Blog
•Mar 12, 2025
Agentic AI: Strategic Value and High-Impact Use Cases for Healthcare Systems
Agentic AI revolutionizes healthcare by autonomously enhancing diagnostics, streamlining workflows and personalizing care. It addresses rising costs and staffing challenges, offering strategic value through improved efficiency, reduced costs and better patient outcomes. Embracing agentic AI positions healthcare systems at the forefront of innovation, ensuring agility and competitiveness in a dynamic landscape.
Blog
•Jul 1, 2025
The Countdown to Citrix LAS: Are You Ready for April 2026?
Citrix is mandating a transition for all on-premises products to its new, cloud-based License Activation Service (LAS). This change replaces the legacy, file-based licensing system and requires organizations to take steps to avoid business-critical service disruptions.
Blog
•Oct 22, 2025
Rethink Observability with a Modern, Composable Architecture
Take control of your telemetry data with a Composable Observability Architecture and liberate IT operations from tool constraints and limitations, telemetry data silos and fragmented operational views. Gain an enterprise-wide view, reduce complexity and drive efficiency at scale.
Blog
•Feb 17, 2025
Agent-2-Agent Protocol (A2A) - A Deep Dive
Explore the transformative potential of Google's Agent2Agent (A2A) protocol, enabling seamless AI agent collaboration across diverse systems. Discover how A2A's scalable, secure, and model-agnostic design can revolutionize intelligent automation, driving operational efficiency and innovation. Uncover why A2A might be the next leap in AI-driven business solutions.
Blog
•Jun 15, 2025
Unlocking the Power of AI Coding Assistants
AI coding assistants are transforming software development by boosting productivity, enhancing code quality and facilitating continuous learning. These tools not only automate repetitive tasks but also provide insightful guidance, enabling developers to work smarter and more creatively. Embrace the future of coding, powered by AI, for better software and happier developers.
Blog
•May 22, 2025
Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python
I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023
Using NetBox Custom Objects
NetBox's custom objects enable tailored data modeling. As organizations seek comprehensive data integration, custom objects empower deployments by embracing the ability to model unique environments, driving innovation and standardization in infrastructure automation. Explore how custom objects can transform your network management strategy.
Blog
•Dec 4, 2025
Nokia SReXperts 25: Key Takeaways
2025 has been a pivotal year for Nokia, headlined by the acquisition of Infinera, the rollout of highly-anticipated hardware updates and an all-new Documentation AI Assistant. The 2025 SReXperts conference provided key updates on these developments and more.
Blog
•Sep 19, 2025
AI Security: Practicing Good Model File Security
As organizations continue to incorporate AI solutions into their workflows and user toolset, the requirements for securely creating, acquiring and storing large AI model files have grown significantly. This blog post explores the risks presented by third-party AI model files and best practices to guard against those risks.
Blog
•Sep 3, 2024
A CTO's Primer on Breach & Attack Simulation: Part 1 - Market Landscape
Breach and attack simulation (BAS) tools are revolutionizing cybersecurity by automating threat testing. While tools like AttackIQ and Mandiant Security Validation lead the market, organizations must prioritize their unique needs over flashy features. This article explores how to select the right BAS solution to align with strategic goals and optimize security.
Blog
•Apr 2, 2025