How to Apply for E-Rate Funding—Step 3: Applying for Funding

When you have completed the competitive bidding process and all bids have been evaluated, you are ready to apply for funding with FCC Form 471. The FCC Form 471 is…

Read Now

What to Do About the Security Vulnerability BlueKeep

You may remember the Spectre/Meltdown event that shook the security world in the beginning of 2018. Today, we need to inform you about the remote code execution vulnerability CVE-2019-0708, also known…

Read Now

How to Apply for E-Rate Funding—Step 2: Evaluating Bids

Last week, we introduced our E-Rate series and discussed how to open the bidding process. In this second post in our E-Rate series, I’m going to talk about Step 2:…

Read Now

How to Apply for E-Rate Funding—Step 1: Competitive Bidding

E-Rate grants are a great way to outfit your school with the technology your students and teachers need to succeed, but it can be a little tricky to untangle when…

Read Now

Ditching the Hardware: An Introduction to Serverless Computing

Introduction In my previous blog, Rethinking Virtualization: Containers in the Data Center, I discuss how traditional server virtualization is really nothing more than hardware virtualization. I also discuss how containers…

Read Now