Repeating commands on Linux with or without changes

Repeating commands on Linux with or without changes

Life on the command line on Linux is clearly something most of us enjoy, but typing the same command again and again can become tiresome. To avoid that boredom, this post explains a number of ways that you can make repeating commands – or repeating commands but with some changes – a lot easier than you might expect. Rerunning the previous command First, the easiest way to repeat a command is simply by typing !!….

Read More

Camden Dream Center levels-up diversity in IT

Camden Dream Center levels-up diversity in IT

It’s often said that technology is a great ‘leveler,’ meaning that the advantages of technology are accessible, and available to all. While there is some truth in this axiom, the digital divide remains an issue. The 2021 Cisco Purpose Report goes into this is great detail. The report starts by acknowledging that Cisco’s purpose to Power an Inclusive Future for All is a never-ending journey; it’s one that challenges us to refuel with each new…

Read More

Support Innovation: How Cisco’s TAC is transforming documentation and simplifying self-service

Support Innovation: How Cisco’s TAC is transforming documentation and simplifying self-service

Co-author: Ambrose Taylor You need to add a new switch to a stack of Catalyst 9300 switches, but it will not join the stack. You could open a Technical Assistance Center (TAC) Case for help but would rather find the answers yourself. Finding the answer on your own timeline is the easiest way to solve the problem quickly, which is easily done as you go and find the solution at Verify and Troubleshoot Stackwise on…

Read More

The key to successful subscription sales may be found in tracking internal product adoption

The key to successful subscription sales may be found in tracking internal product adoption

In today’s ultra-competitive business environment, IT leaders need speed and agility. As a result, we have seen a rise of subscription-based, software-led business models that allow suppliers to satisfy deliver innovations quickly. The pandemic accelerated the transition to a subscription-based model. In fact, during the past decade, companies embracing subscription-based business models have grown 4.6x faster than the S&P 500 average[1]. Initially offered by a few industry leaders like Adobe, Intuit, and Salesforce, subscription-based business…

Read More

IBM bolsters quantum cryptography for z16 mainframe

IBM bolsters quantum cryptography for z16 mainframe

While the need for it may be years away, IBM has added additional mainframe protection against future quantum-based security attacks. When Big Blue rolled out the newest iteration of its mainframe – the z16—in April, one of its core design pillars was a promise to protect organizations from anticipated quantum-based security threats. Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography…

Read More

Cisco Foundation grantee uses data to fight climate change and rebuild healthy forests

Cisco Foundation grantee uses data to fight climate change and rebuild healthy forests

In 2020, wildfires burned more than 4.3 million acres in California, home to Cisco’s headquarters and 39 million people. In terms of size, 4.3 million acres is on par with annual burn rates in the 1800s, before Europeans settled the western United States. What is different now is the severity of the fires due to climate change and overgrown, unhealthy and dry forests; 1.3 million of the acres burned in 2020 burned so severely that…

Read More

Advocating for Passion, Kindness and Women in STEM

Advocating for Passion, Kindness and Women in STEM

Over her 25-year-plus career, Saleema Syed has seen the information security industry from a variety of vantage points, all while championing women in technology. Syed worked as director of business systems and data management for Duo Security before rising to vice president of information technology. Later, after Duo was acquired by Cisco, she transitioned to new roles within the larger organization and now heads up operations for Webex Marketing. In this position Syed brings structure…

Read More

More than a VPN: Announcing Cisco Secure Client (formerly AnyConnect)

More than a VPN: Announcing Cisco Secure Client (formerly AnyConnect)

We’re excited to announce Cisco Secure Client, formerly AnyConnect, as the new version of one of the most widely deployed security agents. As the unified security agent for Cisco Secure, it addresses common operational use cases applicable to Cisco Secure endpoint agents. Those who install Secure Client’s next-generation software will benefit from a shared user interface for tighter and simplified management of Cisco agents for endpoint security.   Go Beyond Traditional Secure Access Swift Endpoint…

Read More

Tech giants, including Meta, Google, and Amazon, want to put an end to leap seconds

Tech giants, including Meta, Google, and Amazon, want to put an end to leap seconds

In her hit song, Cher sang, “If I could turn back time.” For her, that would be a good thing. But in the computing world, Meta, formerly Facebook, believes it would be a very bad thing indeed. In fact, Meta wants to get rid of leap seconds, which keep computing time in sync with Earth’s rotational time.  Meta’s not the only one that feels that way. The US National Institute of Standards and Technology (NIST),…

Read More

Securing Cloud is Everyone’s Responsibility

Securing Cloud is Everyone’s Responsibility

Cisco and AWS demonstrate shared responsibility that identifies Security “of” the Cloud versus Security “in” the Cloud. Shared responsibility remains central to every cloud initiative and defines how cloud providers and customers work together to achieve maximum security across all aspects of the cloud. While shared responsibility is a common term, surprisingly few people understand the model and fewer still have implemented it correctly. The lack of consistent security controls across cloud services does not…

Read More
1 1,134 1,135 1,136 1,137 1,138 1,554