Hairpinning: The Dirty Little Secret of Most Cloud Security Vendors

Hairpinning: The Dirty Little Secret of Most Cloud Security Vendors

In more than one conversation with large enterprise clients, we’ve heard the networking and infrastructure leaders responsible for managing the organization’s global WAN jokingly refer to themselves as the “Chief Hairpinning Officer” or CHO. At first blush, this provides a laugh. But there’s more than a bit of truth to this statement when you consider how much of networking professionals’ time, energy, and budget has traditionally been spent managing complex network routing decisions. These decisions…

Read More

US IT jobs have regained what they lost in the pandemic

US IT jobs have regained what they lost in the pandemic

Nearly all the US IT jobs lost in 2020 during the COVID-19 pandemic have come back, with IT employment enjoying eight straight months of growth. Of course, some of the replacement jobs were in IT specialties other than the jobs lost, as there has been a steady trend of declining data center and telecommunications positions in favor of software development jobs; that was true, even before the pandemic. At its worst, more than 100,000 IT…

Read More

Immersion cooling firm LiquidStack launches as a stand-alone company

Immersion cooling firm LiquidStack launches as a stand-alone company

Ever since Bitcoin was introduced back in 2009, this cryptocurrency has had the distinction of being something you could mine with your computer—putting your hardware to use helping the blockchain technology Bitcoin is based on record and verify transactions by solving complex math problems. As a reward, you’d get Bitcoins. But it was a very slow process for a single PC, and the necessary component for success was a high-end GPU. One GPU brought to…

Read More

Know Before You Go: Hannover Messe Digital Days 2021 – Cisco Blogs

Know Before You Go: Hannover Messe Digital Days 2021 – Cisco Blogs

The pace of transformation in manufacturing has drastically accelerated to meet the needs of today’s changing world. Businesses like yours are prioritizing workforce continuity and business resiliency by enabling workers with the tools they need to safely continue operations, either in person or remotely, while utilizing analytics to maximize productivity, reduce downtime, and ensure protection from security threats. In just one week – manufacturing leaders from across the globe will gather (virtually) for Hannover Messe…

Read More

Accelerating ML/AI Deployments using MLOps – Cisco Blogs by Utkarsh Srivastava

Accelerating ML/AI Deployments using MLOps – Cisco Blogs by Utkarsh Srivastava

Intelligent machines have helped humans in achieving great endeavors. Machine Learning (ML) and Artificial Intelligence (AI) combined with human experiences have resulted in quick wins for stakeholders across multiple industries, with use cases ranging from finance to healthcare to marketing to operations and more. There is no denying the fact that ML and AI have helped in quicker product innovation and an enriching user experience. But hold on to your thoughts for a moment. Have…

Read More

Managed Cloud Security with Cisco Secure Cloud Analytics Provided by Pinnacle Technology Partners – Cisco Blogs

Managed Cloud Security with Cisco Secure Cloud Analytics Provided by Pinnacle Technology Partners – Cisco Blogs

The synergy among AWS, Cisco, and our valued channel partners creates an amazing customer-centric value proposition for those organizations migrating to the cloud. Case in point:  security. In its shared responsibility model, AWS assumes responsibly for the security of the underlying cloud infrastructure. In parallel, AWS customers are responsible for the security of applications, workload, data, and network traffic while running in AWS’ cloud—on an ongoing basis. This task is challenging because of the high…

Read More

Cisco product lifecycle management – Cisco Blogs

Cisco product lifecycle management – Cisco Blogs

The following is based on an excerpt from the 2020 CSR Impact Report, published on December 8, 2020. Central to the concept of a circular economy is maintaining assets at their highest and best use for as long as possible. As Cisco transforms to a software- and features-driven business, we must not lose sight of the importance of our hardware in enabling those solutions. At the World Economic Forum in 2018, our CEO joined forces…

Read More

Cisco Podcast Team Wraps Up Five-Part Financial Services Series – Cisco Blogs

Cisco Podcast Team Wraps Up Five-Part Financial Services Series – Cisco Blogs

Five episodes and eight guest speakers later, we have officially wrapped up our first Financial Services podcast series.  Over the past five weeks, Cisco’s Conversations & Coffee Podcast Channel has focused exclusively on financial services. Each week co-hosts Danny Vicente and Garry Senna welcomed new guests and dove into a different aspect of the industry. In the first episode, “The Future of Financial Services”, Philip Farah, Head of Digital Transformation Services at World Wide Technology…

Read More

Unlock the potential of Application Hosting on Catalyst Access Points – A use case overview – Cisco Blogs

Unlock the potential of Application Hosting on Catalyst Access Points – A use case overview – Cisco Blogs

Application Hosting Overview With the 17.3.1 IOS XE release, Cisco introduced the Application Hosting on Access Point feature. In conjunction with Cisco DNA Center support starting from version 2.1.1, Application hosting on Cisco Catalyst 9100 series Access Points enables developers to create and host applications using Docker style container apps. The Cisco Catalyst series Access Points, through their modular capability and IOx framework, facilitate flexibility for third party software and hardware integration. Application Hosting Topology Let’s…

Read More

Test Automation for Application Security – Cisco Blogs

Test Automation for Application Security – Cisco Blogs

This blog is co-authored by Matthew McCullough and is part three of a four-part series about DevSecOps. Previously, the series explored a framework for continuous security and looked at one aspect of maintaining application security, a software Bill of Materials (BOM,) and associated vulnerabilities. This blog focuses on application security and how Cisco validates its software based on industry and internal security standards. After an application is developed, multiple tests are run (e.g., unit, functional,…

Read More
1 1,303 1,304 1,305 1,306 1,307 1,407