In my previous post, I explained how CIOs are reinventing the mission and role of the IT department in order to support the Digital Transformation of their organisation. And that adopting a Fast IT model is less abo...
By JT Taylor, Senior Marketing Manager, Service Provider Solutions Marketing, Cisco It goes without saying ... Securing your prized assets is paramount. There is no upside to being King of the Kingdom if someone else has the keys....
As application performance, security and delivery get more critical, and as the need for network automation grows, the vision of an architecture that allows easy integration of L4-7 services into the data center fabric is increasi...
Someone at a meeting recently told me how cool it was that big data was finally moving out of the early adopter phase. He's lucky I wasn't drinking a beverage at the time, or he might have ended up wearing it. I'm accused of ...
Guest Blog by Ian Ross, SP Business Development Manager As businesses globally begin to recognize the potential of the Internet of Everything (IoE) in terms of how they structure, manage and improve their operations, it's le...
This post was authored by Earl Carter, Alex Chiu, Joel Esler, Geoff Serrao, and Brandon Stultz. Defining what is malware relies on determining when undesirable behavior crosses the line from benign to clearly unwanted. The lack of...
In the time it takes to get up from your desk, walk downthe hallway and make a cup of coffee, a Cisco Mobility Express enterprise-level wireless network can be configured and deployed. You don't even have to be chained to your des...
CMX just keeps getting better. When Connected Mobile Experiences was introduced nearly three years ago, it ushered in a new era of location based-services. The promise and business potential of the solution has always been exciti...
As digital textbooks, laptops and tablets becomes the new normal of classroom tools -but education budgets for resources and personnel decline -Cisco's Mobility Express Solution provides educators with consistent, secure and easy-...
As today's mobile world evolves with the explosion of mobile and connected devices, small to medium-sized businesses are increasingly faced with the same wireless challenges and opportunities as large enterprises. To help our cust...
As the technology landscape continues its rapid transformation, those who work in the industry are faced with the constant challenge of keeping their skills up-to-date. To address the needs of professionals looking to build, asses...
Historically, threat actors have targeted network devices to create disruption through a denial of service (DoS) situation. While this remains the most common type of attack on network devices, we continue to see advances that foc...