It was pointed out to me that in my last blog post (Don't leak MPI_Requests), I failed to mention the MPI_REQUEST_FREE function. True enough - I did fail to mention it. But I did so on purpose, because MPI_REQUEST_FREE is ev...
Cisco is pleased to be participating in theWorld Congress Telehealth Executive Summiton January 28-29 in San Diego, CA. This two-day conference targeted at senior executives in payer and provider organizations will feature i...
Researchers from Kaspersky Lab have released information about a large-scale cyber espionage campaign called Operation Red October (otherwise known as Rocra). The report has garnered the attention of multiple news agencies and gen...
Here we are...just into the third week of 2013 and questions of how we will use social media in more strategic ways, or measure more effectively, or take our efforts to the next level are already heating up. Goals, aspirations, ex...
[Join Cisco for a Live Announcement Webinar on Cloud Innovations on February 5: Register Here] A commissioned study conducted by Forrester Consulting on behalf of Cisco on Hybrid Cloud technology trends sheds light on many of the ...
Mark your calendars to attend Cisco's Big Ideas Sessions in Room 3D04, EXPO Hall, Level 3: Monday 1/14 @ 9:15 AM: "Catch and Keep" the Digital Shopper - How to Deliver Retail Their Way Tuesday 1/15 @ 9:15 A...
Retailers are entering a new era of consumer shopping behavior fueled by thedigital world in which we live. The explosion of digital content has major implications for retailers across all of the channels through which they offer ...
A phrase I've recently been hearing repeated is that "product features will come and go, but risk mitigation is continuous." With that in mind, our Product Security Incident Response Team (PSIRT) is doing its part by seeking...
The Expo for NRF 2013 -Retail's Big Show -starts Monday 1/14 and runs through Tuesday 1/15 in New York City at the Jacob K. Javits Convention Center. Come visit Cisco booth#252 to see our 5 new innovative demos. Mark your calen...
Last month in my blogJourney to "Self-Healing" Enterprise Networks,we discussed reasons why IT process automation solutions for network domain has not fulfilled its promise. Today we will first reason of the two -"Need for out-of-...
The new Oracle Java arbitrary code execution vulnerability has not only hit many news wires and social media outlets, but many victims as well, and it has been incorporated into several exploit kits. This critical vulne...
Guest Blog by Sarah Evans, Social Media Correspondent Sarah Evans (@prsarahevans) is the chief evangelist at Tracky and owner of Sevans Strategy, a public relations and new media consultancy. She's the author of n...