Following The Great East Japan Earthquake and Tsunami, the Ministry of Education was looking for a way to teach students in remote locations about disaster prevention. Their solution was Cisco TelePresence. To test this method of ...
The best way to succeed is to identify how to fail, then adapt accordingly. So, here's how to lose: Focus on technology, not psychology. 2. Think that cyber security is an IT-only problem. 3. Believe that an air gap will save y...
I'd like to talk about Cisco Application Centric Infrastructure (ACI), and focus on one of the most important steps that Data Center IT teams take on the journey to achieve full automation and deliver agility, security, and e...
I often meet with customers about the first and easiest way to use IoT in an industrial domain: by deploying wireless technology. There is a lot of variety of Radio Frequency (RF) technologies being used in the industrial domain r...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're discussing personal branding with social media. Get the Podcast Listen to this episode Download this episode (right-click on the epi...
Segment routing is coming to a competitor near you and it will be a key element of the network infrastructure of the future. But what is it and how will it offer tangible benefits for you, the service provider? It promises to simp...
The threat environment faced by organization deploying branch networks continues to evolve. It's time for a disruptive approach to handling network security across many distributed branch sites. Automation is becoming a requiremen...
There has been a revolutionary change in the conversation over IT's role within your business. Once centered on reducing costs, today's conversation centers on how IT can move with greater speed and flexibility. Why th...
An issue I can relate to -the lack of women in cybersecurity. While women represented 25% of computing professionals in 2015, they only represented 10% of the information security professions. Cisco gives us time to volunteer to m...
This blog was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently published research regarding a new variant of destructive ransomware, which we dubbed Ranscam. During further analysis of Ranscam samples, we...
Having spent most of my career in product marketing, and having participated in Gartner Magic Quadrant evaluations across multiple technology categories, I can tell you that these things are a lot of work. You might think that Gar...
This year's Mobile World Congress was a hive of all things... well, mobile. There was much to ponder for service providers looking to stay at the cutting edge with the latest tech and solutions. Here are the five hottest topics fr...