Transforming an Industry: The Converged Network Technology that Powered the Super Bowl

Transforming an Industry: The Converged Network Technology that Powered the Super Bowl

“You play to win the game.” I often find myself thinking about how this infamous quote from former New York Jets coach Herm Edwards applies to the world of business. In today’s marketplace, there aren’t any awards for participation. Companies that don’t aim to win rarely remain in business for very long. That being said, the most successful businesses are often the ones that aren’t content to simply play by the rules, in fact at Cisco…

Read More

Announcing Risk-Based Endpoint Security with Cisco Secure Endpoint and Kenna Security

Announcing Risk-Based Endpoint Security with Cisco Secure Endpoint and Kenna Security

With a tidal wave of vulnerabilities out there and brand-new vulnerabilities coming out daily, security teams have a lot to handle. Addressing every single vulnerability is nearly impossible and prioritizing them is no easy task either since it’s difficult to effectively focus on the small number of vulnerabilities that matter most to your organization. Moreover, the shift to hybrid work makes it harder to assess and prioritize your vulnerabilities across your endpoints with traditional vulnerability…

Read More

9 hot jobs in the evolving data center

9 hot jobs in the evolving data center

As data centers evolve, the skills needed to run them change as well, creating both a challenge and opportunity for current data-center workers. By necessity, modern data centers are at the forefront of efficiency for energy consumption, space utilization and automation. That efficiency extends to the personnel that staffs them and who must swiftly implement hardware, software, and architecture changes as best practices improve. That calls for new roles in administration, management, and planning. Existing…

Read More

The Launchpad 🚀 – Kickstart Your Learning Journey – Part 1

The Launchpad 🚀 – Kickstart Your Learning Journey – Part 1

Welcome to the Launchpad, our new blog series! This is your one-stop shop for everything you need to get started with a certain technology or certification path. It’s also the perfect place to be if you just want to learn something cool. As I use my time to pick up a new skill or study for a certification, I realized that I don’t always know where to start. I always feel conflicted because I have…

Read More

3 Reasons Enterprise Developers Should Get “Pager Duty”

3 Reasons Enterprise Developers Should Get “Pager Duty”

In the traditional job description for an enterprise software developer, the day ends when they check in their code and head for the door. If the application they are working on malfunctions in production, they might be consulted during work hours, but they’re not, typically, woken up in the middle of the night.  That job – being on-call to respond to production issues on the spot – falls to the site reliability engineer (SRE). But…

Read More

Learning the Skills to Build the Learning Platform

Learning the Skills to Build the Learning Platform

You know that movie about dreaming within a dream within another dream? Well, that kind of inception world is what I think about whenever I take one of the Cisco Learning Courses to learn something I need to know to work on the platform that hosts those same courses. It blows my mind every time! I know what you are thinking – “Certainly with all the experts within Cisco Learning & Certifications (L&C), they already…

Read More

Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint

Secure your Endpoints and Turbocharge your Security Operations with Cisco Secure Endpoint

Keeping up with the ever-changing threat landscape is hard, with new attacks such as ransomware, fileless malware, and other advanced threats emerging every day. Protecting your endpoints becomes even more difficult when your security environment consists of multiple, disparate solutions, making it too complex to effectively manage. Protecting your endpoints can also seem daunting when you don’t have enough security staff or resources. Cisco Secure Endpoint helps you address these challenges by delivering outcomes that…

Read More

How to Make Coherent Optics Small and Pluggable: Cisco Optics Podcast Episode 22 notes

How to Make Coherent Optics Small and Pluggable: Cisco Optics Podcast Episode 22 notes

Episode 22 of the Cisco Optics Podcast is now posted! See below for episode notes. Podcast episodes are now being added to the Cisco Optics playlist on YouTube! Cisco Optics Podcast Episode 22 Cisco Optics Podcast Episode 22. How to Make Coherent Optics Small and Pluggable, with Tom Williams. Part 3 of 5. Coherent optics have been the go-to solution for high-end optical transport systems for years. Eventually, these optics were modularized and with recent…

Read More

Intel claims sustainability for its custom chip that mines bitcoins faster than GPUs

Intel  claims sustainability for its custom chip that mines bitcoins faster than GPUs

Intel this week announced details of its new Blockscale ASIC chip designed specifically for more efficient blockchain computing than CPUs or GPUs. It first said it was making such a chip just two months ago. Blockscale is specifically designed to process the Secure Hash Algorithm-256 (SHA-256), which is used by blockchain, and the performance is phenomenal, at least on paper. Blockscale has a hash rate operating speed of up to 580GH/s, or gigahashes per second….

Read More

5 VMware products need patching against serious security vulnerabilities

5 VMware products need patching against serious security vulnerabilities

Virtualization and cloud vendor VMware this week disclosed eight vulnerabilities in five of its products, and urged users of Workspace ONE Access and all its products that include VMware Identity Manager components to patch immediately. Three of those vulnerabilities were rated critical on the CVSSv3 scale—two of them contain the possibility for remote code execution, while the third would allow a bad actor to bypass VMware’s user authentication systems to execute unauthorized operations. One critical…

Read More
1 1,179 1,180 1,181 1,182 1,183 1,525