telecom worker
As Connectivity Demands Surge, Telecom Alternatives Become Reality

The era of telecom subservience is nearly over. It’s routine to hate on the telecom providers your operations depend on, but new technology finally makes our collective exodus from telecom providers possible. Their failure to adapt over the next 5…

More Details
drone flying
The Future of IoT Integration

IoT or the Internet of Things is one of the biggest buzzwords in technology and most semi-tech savvy folks define the term to mean a series of connected physical objects that transfer data over a network without human interaction. With…

More Details
hand on keyboard in dark setting
How Hacking Works. And How Software-Defined Perimeter Fights Back.

Hackers rarely take on your firewall directly, dramatically punching a series of keys looking at screens of code in a dark room. It makes for a great movie scene—but the reality isn’t as sexy. I sat down with expert hacker,…

More Details
3 Tree Tech Corporate Offices
3 Tree Executive Roundtable

We are excited to announce the first 3 Tree Tech Executive Roundtable for an in-depth look at network transformation in an ever-changing cloud consumption world. Click here to register > The roundtable will take place at our corporate office in…

More Details
woman looks at dial, 5G challenges written in type
5G Challenges

5G can be extremely beneficial to adaptive business operations, but like any new technology, CTOs and CIOs should be aware of the 5G challenges inherent in this tech. Specifically, three core challenges to be aware of as you consider integrating…

More Details
Jeremiah and Eric Skeens running for Heroes Latinos
Raise Money For Heroes Latinos and St. Jude

It’s my second year running for Heroes Latinos in the St. Jude Walk/Run fundraiser and I’m excited to tell my 3 Tree Family about this year’s event. My team will be participating in this years walk/run at the Portland Zoo….

More Details
hacker using keyboard
Who’s holding you hostage: Cybersecurity companies or hackers?

It’s a serious headline. Although most CIOs and CTOs teams have the best intentions taking proactive steps to prevent a data breach and ward off hacking intrusions, many are stunned when they discover their security response retainer didn’t actually protect…

More Details
cell phone tower
The evolution of “G”

3G. 4G. 5G evolution. And of course wireless 5G. Marketing terms swirl about, claims are made and the “G” terms start to blend together after a while, leading CIOs to rightly ask, is there anything to all this hype or…

More Details
Hardware-Blades Are Out. CloudBlades are In.

New tech released Wednesday has been designed to end the age-old practice that has forced CIOs and IT teams to maintain expensive hardware refresh cycles and tolerate products that routinely struggle to deliver high performance. The era of building “hardware-blades”…

More Details
guy looking at city using wireless 5g integration
Wireless 5G Integration and Application

5G is in the active rollout stage and is said to revolutionize mobile data and remote operations in the same way the wireless phone revolutionized communications, which is why some companies are even considering the technology as a primary connection….

More Details