Like so many people, I love superheroes. I especially appreciate the origin stories about how these characters came into being and evolved over time. We all know mild-mannered reporter, Clark Kent, originated from the Planet Krypt...
Admit it. Sometimes you let your calls go to voicemail. It
When I joined DevNet in December of 2016 it was to dive deep and hard into all things network automation and programmability. Fairly quickly I was entranced with the idea of NetDevOps, and working out how to apply ideas like Infra...
This blog post was authored by John Arneson of Cisco Talos Executive Summary Cisco Talos once again spotted the Ursnif malware in the wild. We tracked this information stealer after Cisco
This Tuesday Veeam announced that they have received SAP HANA certification. Veeam can now protect SAP HANA deployments with native SAP database backups. With Veeam integrations for Cisco HyperFlex and Veeam Availability on HyperF...
Posted on behalf of contributing author: Travis Carlson Travis has worked in networking and telecommunications for 10 years with experience in device programmability, routing, Network Function virtualization (NFV), Amazon We...
As enterprises work towards digital transformation and operational efficiency, they need technology that can adapt to dramatic shifts across the organization and keep up with the ever-increasing demands of modern workloads and app...
Do you remember when school used to be a place? Do you recall going to a building, finding a classroom, locating your desk, and sitting in your row for an hour, or maybe seven? You probably had breaks to go out onto the playground...
Customers tell me time and again that they want flexibility and choice in the tools they use to get work done. One of the ways we support your choice is by making sure the Webex portfolio works with the third-party tools you may a...
Data Privacy is having a big year. The General Data Protection Regulation (GDPR) became enforceable in May 2018, along with potential fines of up to 4% of gross revenue, and many countries have passed or updated their own pr...
Enhanced network security requires continuous research and evaluation of cyberthreat trends. That's why Fortinet conducts regular threat research to share with partners, clients and the broader security community. Understandi...