Service Opportunities for Midsize/Small Service Providers Are Key to Competitive Differentiation – Cisco Blogs

Service Opportunities for Midsize/Small Service Providers Are Key to Competitive Differentiation – Cisco Blogs

By Curtis Price, Program Vice President, Infrastructure Services, IDC Competitive intensity across the service provider landscape has increased significantly over the past few years. While most pronounced in the large tier 1 service provider segment, the level of competition has recently picked up in the midsize and small communication service provider market. The competitive landscape now includes a broader set of providers such as the following: Cable providers broadening their portfolio of services beyond traditional…

Read More

Zero Trust framework improves workforce security and productivity, while cutting support costs – Cisco Blogs

Zero Trust framework improves workforce security and productivity, while cutting support costs – Cisco Blogs

In collaboration with Joel Barbier and Vishal Gupta   Like most companies, Cisco is committed to continually improving security while simultaneously simplifying the user experience. We’ve learned some important lessons along the way. There are multiple points where user ID and password credentials can be potentially compromised. For example, employees sometimes chose to ignore best practices by utilizing easy-to-remember passwords such as “123456.” Others would share their Cisco passwords or use them externally for non-business-related…

Read More

AWS targets IPv6 migration for serverless, container workloads

AWS targets IPv6 migration for serverless, container workloads

Amazon Web Services has launched new support for IPv6-only subnets that can meet the needs of workloads that require more IP addresses than IPv4 can readily provide. The service is available through Amazon Virtual Private Cloud (VPC) and suitable for workloads such as serverless and container applications, according to a blog by Rohit Aswani, a senior specialist solutions architect and Aditya Santhanam, a senior product manager, both with AWS. “Workloads that are constrained by the…

Read More

Cisco to award $1M USD to #TechForGood startups and entrepreneurs addressing social issues and climate change – Cisco Blogs

Cisco to award M USD to #TechForGood startups and entrepreneurs addressing social issues and climate change – Cisco Blogs

Today, I am proud to announce that the sixth-annual Cisco Global Problem Solver Challenge is now accepting applications. One of Cisco’s signature Corporate Social Responsibility (CSR) programs, the Challenge will award $1 million in cash prizes to early-stage tech entrepreneurs who are addressing some of our toughest social and environmental problems. We launched the Cisco Global Problem Solver Challenge in 2016 to jumpstart innovative ideas that benefit society, catalyze economic growth, and create jobs. Since then,…

Read More

Why the world needs us to give on GivingTuesday … and every day – Cisco Blogs

Why the world needs us to give on GivingTuesday … and every day – Cisco Blogs

GivingTuesday was created in 2012 as a day that encourages people to do good. Coming after “Black Friday” and “Cyber Monday,” staples of the year-end holiday shopping season, GivingTuesday is intended to encourage a different kind of giving – through donations, volunteering, or advocacy. There has never been a better time to embrace the philosophy of GivingTuesday. While the pandemic is easing in parts of the world, its effects are still being felt by many….

Read More

An Open Security Ecosystem with Shared Signals is the Future of Zero Trust – Cisco Blogs

An Open Security Ecosystem with Shared Signals is the Future of Zero Trust – Cisco Blogs

Zero Trust: as the name implies, is the strategy by which organizations trust nothing implicitly and verify everything continuously. This industry north star is driving different architectures, frameworks, and solutions to reduce an organization’s risk and improve their security posture.   Beyond the need to enforce strong authentication and authorization to establish trust of an endpoint, how can we verify continuously? Often, the zero-trust approach today uses strong authentication and tools that evaluate the security of…

Read More

Serendipitous Social Impact is Just One Click Away – Cisco Blogs

Serendipitous Social Impact is Just One Click Away – Cisco Blogs

One of the reasons I love working for Cisco is because my values match theirs. Not only is Cisco’s purpose to build a more inclusive future for all, but that is something I strongly believe in as well. I also love that, from this shared purpose, Cisco brought me to an opportunity to ‘be the bridge’ with a social cause that I am passionate about. At the end of last year, I was attending one…

Read More

Enabling the Field Worker in Oil & Gas  – Cisco Blogs

Enabling the Field Worker in Oil & Gas  – Cisco Blogs

The field worker is critical to successful field operations. This may seem obvious, but in an industry that is focused on moving toward automation and remote operations, this essential worker is not always featured prominently in future scenarios. Today’s field work environment is still very manual, as clipboard rounds, manual valves, and unconnected systems punctuate the landscape. It could be dozens of years before all systems are fully digital and can be automated or remotely…

Read More

Shortcuts for adding multiple lines of text to files on Linux

Shortcuts for adding multiple lines of text to files on Linux

There are a number of ways to add text to files on Linux systems without having to open an editor, such as the echo and printf commands. On the other hand, when you need to add A LOT of text, the technique you use can make the job tedious or a piece of cake. This post describes some of the commands you can use and the problems and benefits you can expect. Also see: How…

Read More

Quantum primacy: Is it real (and if so, does it matter)?

Quantum primacy: Is it real (and if so, does it matter)?

The nexus of the ongoing competition among nations and corporations (such as   Google and IBM) to demonstrate quantum primacy has shifted to a university in China where not one, but two experimental quantum computers reportedly have shown that quantum primacy is attainable. Quantum primacy is when a quantum computer is able to solve computational problems that are beyond the ability of traditional “classical” computers, yoked as they are to their quaint system of ones and…

Read More
1 1,093 1,094 1,095 1,096 1,097 1,357