The most recent content from our members.
Ecce homo, behold the Mann. For 30 years Steve Mann has been iterating the EyeTap computing system through which he lives his daily life. A prosthesis over one of Mann’s eyes, the EyeTap simultaneously sends every image—via a beam-splitter—to the eye’s retina and also to a high resolution video camera. The camera’s image…
Over the last few weeks, several bloggers here at SolarWinds have blogged about the concerns IT professionals face as the BYOD (Bring Your Own Device) trend continues to rise (see the most recent one here). As I've read these posts, I've wondered, "Am I just another headache to the IT guys because I use my iPad at work?"…
Are You Prepared for the Future of IP Address Management? Join us to learn how to plan ahead and get 250 thwack points! The increasing number of IP addresses coupled with the growing number of personal devices connecting to your network is changing the state of IP address management. Register for our "Managing the…
The evolution in mobile technology has changed the way we work. Gone are the days when work was only done on personal computers. Even laptops have slowly paved way to trendy mobile phones and tablets. With a new and sophisticated device hitting the market on a daily basis with better technological supremacy, employees are…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article written by my colleague Jim Hansen. It seems that our BYO challenges are not over, and Jim offers some great steps agencies can take to help with these issues. In 2017, the Department of Defense (DoD) released a policy memo…
By Omar Rafik, SolarWinds Senior Manager, Federal Sales Engineering Here’s an interesting article on BYOD, including data on DHS employees. I feel that, in some cases, a better balance needs to be achieved on this issue. Agencies are still grappling with the types of devices using their networks and making device security…
Welcome to SolarWinds blog series “Diving Deeper with NetFlow – Tips and Tricks”. This is the fourth part of the 6 part series where you can learn new tips by understanding more about NetFlow and some use cases for effective network monitoring. In the previous blog, we had discussed the impact of cloud applications on…
On a seemingly peaceful day at work, you suddenly find your phones going berserk - EMAIL’S NOT WORKING!! Hell breaks loose, everybody’s calling in, Vice president of Sales is on the line, and the rest of it is a familiar story….. With some effort, you figure out that there is an IP conflict. IP Conflicts cause the affected…
We know mobile devices are must-have tools for your end users and they’re growing more accustomed to having options when it comes to picking their corporate-connected mobile devices. Two end user mobile enablement strategies seem to be leading the pack: BYOD (bring your own device) and CYOD (choose your own device). BYOD,…
Let's return an earlier topic of how face recognition and wearable computing technology may converge. Google Glass is in a phase of development they are calling the Explorer Program; participants are would-be early adopters who complete an application to buy Google Glass and provide feedback as the product iterates and its…
It looks like you're new here. Sign in or register to get started.