Digital transformation is occurring across all industries as organizations adapt to meet changing consumer demands and the need for a more mobile workforce. While this trend is largely associated with enterprises, it has actu...
In a previous post we introducedCI/CD as a Service (CD/CDaaS)and talked about how it can transform and increase the efficiency of your DevOps practice, that can now serve development and Line Of Business (LoB) teams better. In thi...
Strategy, Technology and Operations Delivering business outcomes for enterprise and IT buyers requires a new approach, new capabilities, and new relationships. An entirely new business solutions practice.Digital Systems Integrator...
Unleashing the Potential of Mobile Cloud Services 5G networking will create many opportunities for service providers. Enhanced mobile broadband and fixed wireless access are two examples of the kind of new service that will be pos...
How many people can say they are fortunate enough to have traveled the world for free in a quest to win a million dollars? Very few, and I'm proud to say I am one of them. In 2008, I was selected to participate in the Emmy award-w...
Segment Routing is the term widely used in the industry to refer to Source Packet Routing In Networking (SPRING), as defined by the Internet Engineering Task Force (IETF). Cisco has pioneered Segment Routing since 2012 and has led...
Seamless cross-access convergence enables service providers to run their networks more efficiently, offering customers a better quality of experience and greater reliability. Growing customer demands for flexible services, alongsi...
Cisco Live was a whirlwind of a week. We had a lot planned in the World of Solutions and for our healthcare session on measuring your hospital's infrastructure capabilities. But those weren't the only healthcare highlights this ye...
When downloading an application from the App Store, do you actually check the logistics of it? For example, how is it connecting to the internet? Or an even more relatable scenario: that game you were playing while waiting in line...
What's Really Out There in IoT Cyberspace? Do you know what is connected to your network right now? If you don't, your network is vulnerable to attacks you might never see coming. You can't protect what you don't know exists. You'...
This blog post was authored by Edmund Brumaghin, Earl Carter and Andrew Williams. Executive summary Cisco Talos has analyzed Thanatos, a ransomware variant that is being distributed via multiple malware campaigns that have been co...
New orchestration functionality and a connector supporting a third party system demonstrate the potential of the open ecosystem Cisco is developing with our partners. Guest Blogger:Anand Louis, Senior Product Manager Open, Cloud-B...