DevNet Learning Maps for Cisco Live Europe 2024

DevNet Learning Maps for Cisco Live Europe 2024

The annual Cisco Live Europe event will take place February 5-9, 2024 in Amsterdam. Cisco DevNet will be there in the DevNet Zone, offering a host of opportunities for network programmers and application developers to meet with experts, and get hands-on immersive training on Cisco programmable interfaces and APIs. But with an event of this size, how do you find the sessions best suited to your needs? No worries! We’ve put together four DevNet Zone…

Read More

How to Use Ansible with CML

How to Use Ansible with CML

How can Ansible help people building simulations with Cisco Modeling Labs (CML)? Similar to Terraform, Ansible is a common, open-source automation tool often used in Continuous Integration/Continuous Deployment (CI/CD) DevOps methodologies. They are both a type of Infrastructure as Code (IaC) or Infrastructure as Data that allow you to render your infrastructure as text files and control it using tools such as Git. The advantage is reproducibility, consistency, speed, and the knowledge that, when you…

Read More

Navigating the DevOps Roadmap

Navigating the DevOps Roadmap

In my previous blog, The Rise and Rise of DevOps Adoption, I explored the remarkable rise in popularity of DevOps and the rapid adoption of DevOps practices across the tech industry. DevOps consists of diverse tools and technologies, each vital in bringing a software product to life. However, this abundance of choices can be overwhelming for aspiring DevOps engineers. In this blog, I will outline a comprehensive DevOps roadmap and delve into the roles of…

Read More

Innovation in the Age of Application Observability

Innovation in the Age of Application Observability

Just weeks ago at Cisco Live, we shared with the world the general availability of the Cisco Full-Stack Observability Platform. This marked a huge milestone in our strategy and dedication to meet customers’ observability needs as they continue to innovate at speed. We also marked the release of our bi-directional integration between ThousandEyes and AppDynamics, something customers had been really excited to see. And since its launch, it’s become clear during my customer meetings that…

Read More

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration

Improving IT security through cross-department collaboration | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Shifting left isn’t always right

Shifting left isn’t always right

Shifting left isn’t always right | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Shift left: Beyond the cybersecurity buzzword

Shift left: Beyond the cybersecurity buzzword

Shift left: Beyond the cybersecurity buzzword | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

How zero trust DevOps eliminates risk of unsanctioned cloud access

How zero trust DevOps eliminates risk of unsanctioned cloud access

How zero trust DevOps eliminates risk of unsanctioned cloud access | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk?

Can developers reduce open source cybersecurity risk? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

How to build more secure APIs

How to build more secure APIs

How to build more secure APIs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More
1 2 3