This is the latest in a series of posts featuring partner success stories where partners share how they're helping customers achieve their goals by using Cisco technology. This week we're featuring Richard G. Twilley, CenturyLink ...
As cloud technology and organizations mature, customers are shifting their focus from the provisioning of individual servers to richer cloud-based application platform stacks. Why? Servers usually do not exist as standalone entiti...
Time is money. And the more time it takes to deploy and provision devices on your network, the more costly it is for your organization. On August 21, join our experts for a deep-dive exploration of Cisco Prime Infrastructure, a cr...
Cisco UCS supports many compute nodes, in a data center there most likely will be more than one UCS system, managing hundreds of compute nodes. These UCS domains will probably have very similar requirements for VLANs, VSANs, vNIC ...
My first DEFCON was DEFCON Three, held at the Tropicana Hotel in Las Vegas. The computer security conference scene was much, much smaller back then, but DEFCON had already become THE security conference of the year. Sin...
Every Friday, we'll highlight the most important Cisco partner news and stories of the week, as well as point you to important, Cisco-related partner content you may have missed along the way. Here's what you might have missed thi...
Earlier this week, our colleagues at Cox took the wraps off a beauty of a next-new version of personalized television, branded "Contour." It's a continuation of its service extensions earlier this year into screens "beyond the TV,...
Over the last several weeks, I've been posting a blog series around nine HIPAA network considerations. HIPAA Audits will continue The HIPAA Audit Protocol and NIST 800-66 are your best preparation Knowledge is a powerful weapo...
Many branch offices rely on Cisco ISR G2 (Integrated Services Router, Gen 2) as their IT platform. This router series delivers highly secure data, voice, video, and application services through a modular design. This t...
DNS records are an attractive target for distributors of malware. By compromising the DNS servers for legitimate domains, attackers are able to redirect visitors to trusted domains to malicious servers under attacker control. DNS ...
Accelerating the Disruption in Business Mobility Business mobility is driving better productivity, heightened customer experience, and harmonious work/life balance. It also offers freedom for knowledge workers beleaguered by accel...
Business mobility is driving better productivity, heightened customer experience, and harmonious work/life balance. It also offers freedom for knowledge workers beleaguered by accelerating demands on their time and talents. Indeed...