Blog
November 25, 2013
IPV6 The Two Years Have Finally Arrived

Approximately fifteen years ago the demise of the IPv4 address pool and the popular use of IPv6 has been two years away. In 2000 we were going to run out of IPv4 address by 2002, in 2003 it was 2005 etc. etc. etc. Well we have finally made it those two years, IPv4 is still…

Read More

November 25, 2013
To the Cloud? The 8lb. Rule

The cloud has had many definitions. In the early 90s when most enterprises maintained private line networks, moving to a frame relay or ATM service from the carriers was referred to as transferring their data over the cloud. In those days I was teaching service provider sales teams and I would insist on a definition…

Read More

September 10, 2012
What Is A Juniper Operate Specialist Partner?

What is a Juniper Networks Specialist Operate Partner? This overview is based on the global certification and criteria outlined in their Channel Partner Program. Integration Partners is an Elite Juniper Partner and Operate Specialist

Read More

February 16, 2012
Free Gartner Enterprise Network Firewall Report

Click here for Free Gartner Enterprise Network Firewall Report Gartner has published their 2011 Magic Quadrant for Enterprise Network Firewalls. Key points outlined in the report include: Palo Alto Networks was recognized as a leader. According to Gartner, vendors in the leaders quadrant “lead the market in offering new safeguarding features, providing expert capability, rather…

Read More

January 25, 2012
Avaya Flare Communicator Now Available for iPad

  Avaya Flare Communicator provides employees and their companies with the following capabilities and benefits: View the availability of enterprise associates from the contacts card and simply tap a single location to launch an instant message (IM), voice call or email Manage two simultaneous voice calls using the iPad while mobile Multi-task on the iPad…

Read More

September 9, 2011
What are Session Border Controllers?

Call agents are very familiar with borders controllers. These devices control the call admissions to the network at the border of that network to help regulate the amount of calls where an agent is working. Session Border Controllers are Voice-over Internet Protocol (VoIP) devices, which can also perform many other necessary call control functions. There are…

Read More

August 31, 2011
Disaster Planning Pays Off in the Wake of Hurricane Irene

For countless companies, Hurricane Irene provided a chance for IT firms to test the effectiveness of their disaster recovery and business continuity plans. First and foremost, companies needed to ensure continuous data center services, and preliminary evidence seems to indicate they succeeded.  The centers themselves were well-protected from the elements; many, for example, are designed…

Read More

August 19, 2011
Protecting Your Company From Insider Hack Attacks

It is often the goal for companies large and small, from large pharmaceuticals to your local insurance broker, to protect your data from outside threats. But what about the potential threats from the inside? A recent article in Information Week related the story of Jason Cornish a disgruntled employee from the pharmaceutical firm Shionogi. Mr.…

Read More