IT Resources
Filter By:
Next Generation Protection with Cisco Secure Firewall and Hybrid Mesh Firewall
Cybersecurity threats continue to evolve, and organizations need security solutions that can keep pace across every environment. In our recent webinar, Next Generation Protection with Cisco Secure Firewall and Hybrid Mesh Firewall, presenter Michael Mahlmann explored how Cisco is transforming network security with stronger threat protection, simplified management, and scalable deployment options. Watch the demo … Read more
Streamlining IT Procurement and Deployment for the City of San Antonio
In 2009, Computer Solutions entered into a partnership with the City of San Antonio as a hardware and software provider. Over the last decade and a half, our relationship has evolved into a professional services relationship focused on project delivery and support. The City of San Antonio began experiencing delays in device upgrades and realized … Read more
Why the Global Chip Crisis Is Now a Business Strategy Problem
The ongoing global chip shortage has been framed as a simple supply issue, but it’s evolved into something far more disruptive: a procurement and planning crisis affecting pricing, timelines, risk management and even organizational structure. For businesses across Texas and beyond, it has become more than an IT problem, now it’s an operational one. The … Read more
Spotlight: Travis Jones on Innovation, Modernization, and the Future of IT
After more than two decades at Cisco, Travis Jones has returned to Computer Solutions in a newly created role: Chief Innovation Officer. The position reflects a broader shift within the company. As technology evolves faster than ever, Computer Solutions is investing in leadership that helps both the company and its customers stay ahead of what’s … Read more
Why Data Recovery Starts with Identity
When organizations think about ransomware recovery, they often focus on one thing: getting their data back. However, successful recovery isn’t just about restoring files or spinning servers back up. It’s about restoring trust in your environment, and that starts with identity. Modern ransomware attacks don’t just encrypt data. They target identity systems first. The 2025 … Read more
From Reactive to Resilient: Why Managed Cybersecurity Is No Longer Optional
Organizations of all sizes face ongoing disruption from increasingly sophisticated cyber threats like ransomware, phishing, insider risk, and expanded supply chain vulnerabilities. The attack surface now extends well beyond traditional network boundaries. For many businesses, the question is no longer if an attack will happen, but when, and how businesses will respond. The biggest challenge … Read more
Future-Ready Networking: Inside Cisco’s Latest Innovations
Unlock the latest breakthroughs in unified management, AI-powered analytics and cloud-enabled operations with Cisco Catalyst Center and Dashboard or dive into Cisco’s full Wi-Fi 7 AP portfolio and groundbreaking Ultra Reliable Wireless Backhaul (URWB) capabilities. Our Enterprise Network Solutions Architect, Wes Stevens, walked us through exciting updates Cisco advancements you don’t want to miss. Watch … Read more
Alyssa’s Law: What It Is, Why It Matters and How to Stay Compliant
Alyssa’s Law is one of the most important legislative responses to the growing need for faster, more reliable emergency communication in schools. The law is designed to reduce response times during critical incidents and save lives in the process. We’re explaining what Alyssa’s Law requires, the challenges it solves, and how partnering with the right … Read more
The Global Chip Shortage Still Matters and What It Means for Your IT Strategy
If it feels like the global chip shortage has been around a long time, that’s because it has. Even while the headlines have faded, the impact on IT solutions and services businesses is ongoing. For organizations planning hardware updates, infrastructure upgrades or growth initiatives, the new normal includes delays, higher costs and tighter supply chains. … Read more








