Digital signatures are used to verify the authenticity of a message. For example, when a message is signed, the verifier can rest assured that only the signer could have signed it. ECDSA and DSA are two widely used, standardized d...
Like many other industries, hospitality is undergoing a digital transformation. Guest WiFi access has gone from being an amenity-and something that would simply enhance the guest experience-to being just one of many services that ...
Friends, The team is excited, especially our FindIT Product Manager, David Harper for the announcement of his Network Monitoring and Management Platform. But why? Today's market offers businesses a wide range of networking options...
Whew! Black Friday and Cyber Monday came and went quickly this year! With these two biggest annual shopping days coming earlier every year and more and more consumers taking advantage of outstanding online shopping opportunities, ...
When you start working at Cisco, you quickly realize folks here have their own language. Sure, there's tech lingo and acronyms galore, but it goes much deeper than that. You hear, quite a bit, in those conversations that people h...
As I promised in my last blog, A New World of Co-Innovation, I want to update you on the outcomes of the Cisco TAG.PASS Smart Innovation Programme. After 22 weeks of co-development efforts from ideation to prototyping, the Cisco-T...
Data centers house servers, physical or virtual, that provide storage, communications, and networking to the growing number of networked devices, users, and business processes in general. The growing importance of data analytics-t...
As I blogged in July of this year, Cisco supports protecting and enabling the international flow of personal data that furthers a progressive economy. To that end, we received official word that we are loud, proud, and on the list...
Three Keys to Success Preparing Your Mobile Network for 5GDownload our new 5G ebook The concept of slicing is a fundamental component of the 5G architecture and it permits network customization that can reach a personal level. ...
In our highly connected business environments, the need to respond to the inevitable security breach is on the minds of every CISO. An increasing number of organizations rely on the services of a Managed Detection and Respon...
In several parts of the world December 6 is a day that especially children look forward to: It's St. Nicholas Day and children hope to be on St. Nicholas' good side to receive a small gift. If you want to read more about the...
In my previous post, I shared the challenges of innovating within a large enterprise. I also shared some solutions, including our creation of Startup//Cisco-our grassroots effort to accelerate startup up DNA within Cisco. Since la...