Home LookingPoint Blog

Blog

The final day of INBOUND 2017 kicked off with a keynote featuring Pixar Animation Studios co-founder, Dr. Ed Catmull. Catmull shared his success and failures at Pixar, as well as his insights about creativity today. He discussed the importance of change, responding to challenges, listening, empathizing, and making mistakes. The goal when founding Pixar was to build a sustainable culture. He...

Continue reading
Sep 27

Day 2 of INBOUND 2017 has come to an end, and it has been one for the books. The day began at 6:45am in line to see Michelle Obama’s keynote at 9am. All I can say about that is her keynote was worth the wait! I could write an entire blog about her insights, demeanor, and control of the room, but for the sake of this post I will keep it to my key takeaways.

Continue reading
Sep 26

INBOUND is HubSpot’s annual marketing conference, and I am in Boston this week for INBOUND take two! The conference kicked off last night with an inspirational keynote featuring best-selling author Brenē Brown. She spoke about her new book, Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone. She also talked about how true belonging doesn’t require us to change who...

Continue reading
Sep 20

Cisco has rolled out a new way to allow customers and partners to manage software licenses. This new feature is called Smart Accounts, which lets you view and control access to all your Cisco software licenses and entitlements across your entire organization. Once you set up your Smart Account you will be able to create up to 200 sub accounts called Virtual Accounts, which allows you to organize...

Continue reading

You have been working as a network administrator for your company for a few years now. In that time you have been asked to complete a handful of network projects; a new office turn up here, replace some switches or a router there. The whole time you work from old templates or, in the case of replacement gear, just copy and paste the old config. Have you ever really stepped back and looked at the...

Continue reading

In this Fireside Chat CEO, Sean Barr, sits down with Solutions Architect, Marshall Hill, to discuss two-factor authentication, and the best practice to ensure that the person accessing your data really is who they say they are. Sit back, relax, and enjoy this Fireside Chat.

Continue reading

What is Two-Factor Authentication?

At its core, two-factor authentication is all about checking credentials. Are you who you say you are? Traditionally, a user name and password are used to log into a secure system. Two-factor authentication provides an additional layer of security, in the form of something you physically have, to be able to log into the system. This can be a physical token in...

Continue reading

Next Generation Firewall (NGFW), we’ve all heard of this often-used term (maybe overused) but what does it mean? What do you get if you have one and how do you get it? All great questions that begs to be answered.

Continue reading

It’s approaching 10pm on Friday night and you are getting ready to apply your IWAN / Routing Protocol / <Insert major project of your choosing> migration script to the very last of your branch site routers. You have been saving this branch till last for a very special reason. This is after all that branch site that is in the furthest darkest corner of the globe. Your company of course has no...

Continue reading

Earlier this month Cisco released their 2017 Mid-year Cybersecurity Report. Cisco has been publishing this comprehensive cybersecurity report for nearly a decade with the goal to keep security teams updated on the latest cybersecurity threats and steps they can take to improve security and cyber-resiliency. The latest report highlights the “rapid evolution of threats and the magnitude of the...

Continue reading
  • There are no suggestions because the search field is empty.

Latest Tweets