<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=522217871302542&amp;ev=PageView&amp;noscript=1">

Acadia Blog

Cisco DNA Center: Reducing Human Error with Automatic Provisioning

Cisco has been dominating the networking market for several decades now and this phenomenon promises to continue with its new “revolutionary” intent-based network. It’s revolutionary because it...

The Future Network: Using Machine Learning to Identify Malware

In the world of cyber security, experts are excited by the fact that they will be able to detect malware in encrypted traffic. It hasn’t been done before and is only possible now because of the...

An Overview of Intuitive Networks

Our partner and industry leader, Cisco, recently announced that an entirely new era of networking had just begun. When the tech giant previously claimed to be years ahead of their networking...

Ransomware in the Legal Industry - How to Protect your Firm

Ransomware attacks are on the rise, grabbing headlines on a global stage. In April 2016, the Federal Bureau of Investigation warned that cyber criminals have already extorted $209 million from...

Change Management Matters

Stable networks need it.

If you want to have a stable network, you need to have an effective change management process.  Why bother?  Changes are the most common source of instability in your...

Advanced Unified Communications

I’m pleased to announce that Acadia has achieved Cisco’s Advanced Unified Communications Certification. This certification authorized Acadia to sell Cisco’s full line of Unified Communications...

Building Complex Networks with Virtual Networking

Virtual networking is a computer network that consists of a virtual network link. The virtual network link does not consist of a physical, wired or wireless, connection between computing devices...

Managing a Myriad of Mobile Devices

The lines between various mobile devices are blurring. As real world applicable mobile technology has just taken flight, many enterprises host a myriad of different platforms. A policy that...

The Best Security For Mobile Devices

Many enterprises are now embracing mobile devices such as cell phones and tablets. The rapid adoption of these devices has enabled greater mobility to the workforce. However, it has brought up a...

Your Data In The Cloud – The Good and The Bad

An October 10, 2011 Network World article titled “Beware of the iCloud” described an enterprise nightmare scenario around Apple’s newly introduced cloud storage service:

“You’re at your office...