Photo Tour: Interop Hot Stage Test Facility

Wednesday, April 01, 2015

Interop NOC
Later this month, one of the largest computer networking shows, Interop will take place in Las Vegas, with over 10K attendees.

Before that happens, the Interop NOC team will architect, design, assemble and configure all of the hardware and software that will run the network for the show. Equipment the team will deploy includes:
Below are a few pics of the Interop Hot Stage Test Facility in Brisbane, CA where the magic happens. The last picture is our CEO, Brandon Ross, the routing team lead for the show.

Understanding IPv6: business drivers and transition technologies

Tuesday, February 24, 2015

If you missed Brandon's discussion on IPv6 today, you can listen to it via BlogTalkRadio below:

Network Utility Force is now a CWNP Training Partner

Thursday, February 19, 2015

As a result of on-going requests by our customers and partners, and to support the rapidly growing WiFi community, we're now a Certified Wireless Network Professional (CWNP) training partner.

Initially, we will offer the Certified Wireless Technology Specialist (CWTS) course, which we'll begin providing in Q2, with plans to offer additional CWNP WiFi certifications around the end of the year. For more information, please send an email to:

Record Growth in 2014

Tuesday, January 20, 2015

We're pleased to announce we had a record year in 2014, surpassing over one million in revenue. For details, please read our press release.

Our sincere appreciation to our customers and partners for making it possible. Here's to a great 2015.

Shellshock Security Scan and Remediation

Tuesday, September 30, 2014

If you've heard about Shellshock, you likely understand the significant vulnerabilities this bug exploits in Unix BASH shell, by allowing for arbitrary remote code execution and watering hole attacks, among other exposures. Some security experts claim it's potentially worse than Heartbleed, as it impacts vast amount of servers that process huge volumes of Internet traffic, including almost all CGI-based web servers. For example, by this past Friday afternoon (September 26, 2014), there had been over 17,000 attacks on more than 1,800 domains.

While reliable patches are still being developed, as the initial patch did not fully fix the problem, network and system administrators should scan their infrastructure for the existence of Shellshock, and perform remediation measures as soon as possible, which may include, preventing incoming traffic to servers impacted on the network.

Since this is a well-publicized issue, exploitation attempts of this vulnerability have been skyrocketing, making Shellshock security scans and remediation immediate priorities.

If you would like assistance with a Shellshock security scan, and/or Shellshock remediation services, particularly with your publicly exposed network segments, simply email us at to get started.