Although Deakin University in Melbourne, Australia is relatively new in terms of universities (it was founded less than 50 years ago) they have made significant achievement in this time in reaching the the top 3% of rankings in hi...
Since the announcement of our unprecedented next phase of analytics with IBM, the wave of steady validation from the market has been growing. We are approaching analytics like never before, leveraging our strengths in hardware, so...
There's been a lot of big talk about IoT for the past several years, and I admit, I've been skeptical. Thermostats. Toasters. Fitness trackers. So what? Why is this so transformative for Cisco's customers? I wanted to understand t...
The ability to analyze and act on data is more important now than ever as digital business is rewriting the rules of competition. To stay ahead, it's more than the ability to react quickly. It's the ability to respond strategicall...
One of the most important devices in my life is my PC -maybe even more important than my coffee machine. I take it with me to hair dresser appointments, long car rides, holidays; practically everywhere I would have some time...
Cisco redefines what a UTM can be with AMP and Threat Grid for Meraki MX Cybercriminals don't discriminate -every organization is a target. With the threat landscape continuing to evolve and ever expanding connectivity, digitizati...
In a nutshell, it's a good thing! In a world that is digitising, safe global transfer of data is essential to a progressive economy. The Privacy Shield is a framework designed to provide EU-like data protection for personal data p...
This post was authored by William Largent Today, Microsoft has released their monthly set of security bulletins designed to address security vulnerabilities within their products. This month's release is has 11 bulletins addressin...
Welcome to Cisco Live US -whether you are attending in person or amongst the many thousands attending virtually this week, thank you for the opportunity to spend time together. As our largest of our customer gatherings every year,...
Until recently, the promise of Network Function Virtualization (NFV) was largely confined to service providers who were looking to improve efficiencies by leveraging Virtualized Network Functions (VNF) running on x86 machines. Not...
As an organization, providing secure guest and corporate Internet access at the branch can be a major challenge. Not only do you have to protect the enterprise, you also have to protect your customer. Protection is good... but it ...
Co-authored by John Growdon Digital transformation. You've heard us talk about this a lot, and for good reason. It's swiftly changing how organizations globally must do business. For businesses to keep pace, they need access to th...