If you recall, back in the early days of 802.11n, the Wi-Fi Alliance (WFA) rolled out the 802.11n certification program in phases. Here we are several years later and in that same fashion, the WFA has split the IEEE 802.11ac...
My friends at Cisco's TechWiseTV have taken MDM to heart and have offered some keen insight from a geek's POV (point of view) into MDM. Starting with a primer on MDM, Networking 101: MDM, Jimmy Ray answers the questions on what is...
"Watering Hole" attacks, as evidenced by the recent attack involving the U.S. Department of Labor, are becoming increasingly popular as alternatives to attacks such as Spear Phishing. In a "Watering Hole" attack, the attacker...
A new white paper from IDC discusses how converged infrastructure solutions from Cisco and EMC, through VCE, can enable IT organizations to deploy a highly virtualized, highly efficient computing infrastructure. For those new to t...
By Andrew Yourtchenko, Technical Leader, Network Operations Systems Technology Group As any geek, I find it a lot of fun to get some hands with the new technology -be it a new gadget, new product or a solution. It's not very often...
Nothing makes a product marketeer's job easier than when customers send in their own video testimonials about how successful they have been using our products. Today's video comes all the way from one of my favorite cities in the ...
Traveling has been a large part of my career at Cisco. Over the last few years I have had the opportunity to travel to customer meetings around the world, discussing their innovation and use cases for Cisco Small Cell Solutions. &...
This blog was originally posted on the Huffington Post. This week I had the privilege of attending an event at the White House where the First Lady of the United States, Michelle Obama, and John Chambers, Chairman and CEO of Cisco...
Over 200 attendees were present for the opening of two different Co-Innovate Labs (COIL) recently. The COIL is charged with accelerating co-innovation within the SAP partner ecosystem. This lab is part of the company's global R&am...
This is the second and final part of my series about security logging in an enterprise. We first logged IDS, some syslog from some UNIX hosts, and firewall logs (circa 1999). We went from there to dropping firewall logging as it i...
Update 25/9/2013: Microsoft has released a "Microsoft fix it" as a temporary mitigation for this issue on systems which require IE8. At this time, multiple sites have been observed hosting pages which exploit this vulnerability. U...
Cisco's server power engineering team recently compared the Cisco UCS 5108 Blade Server Chassis with B200 M3 blade servers against HP's BladeSystem c7000 Enclosure and HP ProLiant BL460c Gen8 blade servers. The results weren't sur...