Recently, Cisco's Rob Lloyd sat down with Sungard AS to discuss how hybrid cloud services are changing the way organizations use the cloud. As the president of development and sales, Rob understands many different sides of t...
You order a movie online and additional suggestions pop up, based on a deep knowledge of your likes and dislikes. You plan a vacation and similar suggestions appear, reflecting your financial state, the climate in which you live (...
As the IETF (Internet Engineering Task Force) meets in Hawaii (IETF 91), the unavoidable question for both participants and observers is whether a Standards Development Organization (SDO) like the IETF is relevant in a rapidly exp...
To address many questions about mobility, I am delighted to share with you our point-of-view through our "CiscoSPotlight Series," an ongoing course of videos in which we answer questions and provide commentary on many hot topics i...
When you hear the name Cisco, what comes to mind? A pretty safe bet is that you think "enterprise networking leader." Of course, we want you to always think of us in those terms, because it's true. However, I wanted to be sure our...
Cisco supports an open Internet and believes that the FCC should adopt balanced rules without imposing the draconian regulatory requirements known as Title II. Heavy-handed regulation under Title II could significantly inhibit new...
Within 24 hours of the deadly fertilizer plant explosion in West, Texas almost 2 years ago, Cisco's Community Relations team had already committed to help residents impacted by the devastation and contacted me in Cisco's Richardso...
The Internet of Everything continues to gain momentum and every new connection is creating new data. Cisco UCS Integrated Infrastructure for Big Data is helping customers convert that data into powerful intelligence, and we're wo...
I've mentioned libfabric on this blog a few times: it's a set of next-generation APIs that allow direct access to networking hardware (e.g., high-speed / low latency NICs) from Linux userspace (kernel access is in the works). To g...
Today the web is a favorite vector for threat actors to launch their attacks. According to the Cisco 2014 Midyear Security Report, More than 90 percent of customer networks observed in the first half of 2014 were identified a...
As consumers and workers seamlessly movefromhome, to the office, the subway, coffee shops, and everything in between, they expect a seamless connectivity between their mobile, Wi-Fi, and broadband experience. It makes sense ...
When I was in college, I didn't have e-mail. Cell phones were rare and there was certainly no such thing as a smart phone, tablet, a laptop, or Google. Sometimes I look back and wonder how I ever survived without...