Cisco Cognitive Threat Analytics is a security analytics product that discovers breaches in Cisco customer's networks by means of advanced statistical analysis, machine learning and global correlation in Cisco security cloud....
Customers frequently comment that IT simply isn't keeping pace with their needs. Provisioning new data center resources can take weeks. To be fair, IT professionals are doing the best they can but manual processes and ...
By Adam Davies,product marketing manager for Infinite Video, Service Provider Video Software and Solutions, Cisco By now it's very clear that TV and entertainment viewing habits are changing. More people are accessing more content...
During my college years, I worked for a major US airline. It was a great job but could get a little rough when faced with cancellations, overbookings, missed connections, etc. However, when faced with challenging situations I...
The press lit up when we announced a landmark partnership with Apple last week. This was definitely an important announcement for us. As you can imagine, everyone is very excited with what this partnership can make possible for en...
The Cisco Research Triangle Park (RTP), North Carolina campus, normally quiet over the weekend, will be alive and buzzing with activity this Saturday, September 12, as hundreds of students, robots, coaches, and volunteers gather f...
You know the differences between 802.11ac and 802.11n. You can explain how to install a wireless network until the digital cows come home. You even know the technical term for "the fear of phones"! How about taking all that knowle...
Earlier this summer I was privileged to be the closing keynote speaker at the UTM Convention, sponsored by the Association for Unmanned Vehicle Systems International's Silicon Valley chapter. The convention took place at the NASA ...
Aletterfrom private sector businesses and organizations to the Federal Communications Commission, and Departments of Transportation and Commerce, agreeing on a single set of principles to examine use of the 5.9 GHz band by unlicen...
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Sinc...
Growing up, my grandfather and I were very close. As a boy and young man, I learned a lot about the world from the stories he would tell me on his porch in Chicago about his life growing up black in the segregated south, the...
Keeping citizens, communities, and countries safer Around the world, countries are under increasing pressure to better serve their citizens, protect critical resources, and ensure safe communities and nations. In r...