For those of you familiar with the movie "This is Spinal Tap" the volume on SDN has been turned up to 11 for some time. However, too much of the sound is around the technology and not on the benefits to network operators. In fact,...
Dan Goodin, editor at Ars Technica, has been tracking and compiling info on an elusive series of website compromises that could be impacting tens of thousands of otherwise perfectly legitimate sites. While various resear...
Today, many encrypted networks use insecure cryptography. Attackers exploiting weak cryptography are nearly undetectable, and the data you think is secure is less safe every day. Legacy encryption technology can't keep up with cur...
We estimate there are approximately 1.4M potential mid-size and large customers globally. Reaching them with the right message and the right offerings at the right time is not trivial, nor is it something that just luckily happens...
In the next few weeks we have a couple great webinars coming up, we've recently been investing in our community, the Unified Access Challenge was extended until April 26, and the Supervisor 720 Engine for the Catalyst 6500 turned ...
Guest blog by Ntombozuko (Soso) Luningo Soso Luningo is a trainer with the ICT Academy at CIDA City Campus in Johannesburg, South Africa, where she trains students on the Cisco Networking Academy curriculum This is my first blog e...
By Mark Loesel, Cloud Solutions Marketing, Cisco I hope that you are able to join us at Cloud Connect this week in Santa Clara as we have much to share with you. Cloud Connect is a great show that attracts more than 4,000 industry...
By Uwe Lambrette, Director, IBSG Service Provider Cloud adoption is accelerating at an impressive pace. To gain a deeper understanding of the current rate of change, and the dynamics of cloud's evolution, the Cisco Internet Busine...
This Wednesday, we're kicking off a great webinar series that will walk you through the Cisco Unified Access solution. With the five-part series, we're breaking down the one policy, one management, one network story into technical...
With the industry's drive toward personal and wearable devices, soon people will be walking around with smart glasses, watches, phones, and even shoes. Not to mention they'll be driving networked cars. In the future, the task of s...
Protecting Your Business in an "Any to Any" World Innovation never stops in the mobile world, and that rule applies to security threats as well. Network attacks are becoming more sophisticated and even high-tech businesses with th...
We're 13 years into the new millennium and we still don't have flying cars, house cleaning robot maids or refrigerators that talk back to us. Not everything predicted for our Jetson-like future came true - or maybe not as qu...