Run your own virtual machine directly on a Cisco router. In 2013 we introduced a pretty cool new trick for Cisco routers. The ISR 4000 Series and ASR 1000 Series can host virtual applications directly in IOS XE operating system. S...
Not "New Data" But "New Ways of Getting Data" Model-driven telemetry has been one of the most fun projects I've worked on in a long time. Right from the start, we worked hand-in-hand with customers to identify their biggest pain p...
To explore and refine pedagogical models for providing lifelong learning opportunities to alumni around the world, Northwestern University's Kellogg School of Management was in search of an effective way to deliver education and l...
Here's an observation that happened to serve as the basis of a keynote I had the opportunity to give the other day, at the TIA 2016 "Network of the Future" conference, in Dallas: Yes, it would be wonderful indeed if broadband serv...
Every day, the world is becoming more and more connected. And that's good; being connected allows for people to trade ideas easier, monitor their health more efficiently and get things done quicker. In today's mobile world, a typi...
Defense in depth is a well understood and widely implemented approach that can better secure your organization's network. It works by placing multiple layers of defense throughout the network to create a series of overlapping and ...
You may be well aware of the cyberattacks on retailers and banks, but did you know malware encounters are on the rise in the energy and oil & gas sectors? The findings of the Cisco Annual Security Report may shock you. The 201...
As we deliver more and more software projects in my part of Cisco Services, I have a keen interest in software development best practices. And concerns on poor practices. A few weeks ago, a software vendor made a ...
We're always on the lookout for the next big application to drive Internet traffic. When we see a type of traffic almost doubling in a year, we put it on our watch list. Below are five that topped our watch list based on the most ...
Talos has updated its TeslaCrypt decryptor tool, which now works with any version of this variant of ransomware. You can download the decryptor here. When Talos first examined TeslaCrypt version 1.0 in April of 2015, we articula...
A shift in global economic power towards Asia has forced developed countries in particular to re-evaluate their own economic futures. A premium is now placed on the speed of innovation and the ability of countries to transition aw...
Just Ask Dave: Properly and efficiently delivering public services to your constituency can be as important as keeping someone like poor Dave out of the metaphorical doghouse. Or when you consider something such as serving your se...