Automating Observability of Public Cloud Deployments with Cisco Cloud...
Turn cloud native chaos into business context Considering that more than 90% of organizations leveraging public clouds are moving to a multi cloud strategy Cisco Observability Platform [1] promises…...
View ArticleIdentify Weak Links in Your Application Stack – Part 1, Health Rules
Health Rules and Cisco Cloud Observability APIs Applications are the face of an organization, and we are entering the new age of application observability.[1] Keeping applications running like a… Read...
View ArticleComing Soon to Wi-SUN Field Area Network: Versatility to connect sensors with...
The Catalyst IR8140 Heavy Duty Series Router will be Cisco’s first router to support new Capabilities for FAN 1.1. to meet increasing digitization needs. In 2019 the Wi-SUN Alliance introduced the f…...
View ArticleWebex Connect’s Second Quarter
Five months after the launch of Webex Connect in August 2023, the enterprise-grade Communications Platform as a Service (CPaaS) has continued to enhance how businesses engage with their customers.…...
View ArticleIdentify Weak Links in Your Application Stack – Part 2, Anomaly Detection
Anomaly Detection and Cisco Cloud Observability APIs In the Part 1 blog [1], we talked about the importance of application observability and how the application stack is more complex than ever with…...
View ArticleHelping Service Providers Ensure Their BEAD Network Build-Outs Are BABA...
Regulatory concerns around the Broadband, Equity, Access, and Deployment (BEAD) funding program are top of mind for those involved in rural broadband opportunities, and the Build America, Buy America…...
View ArticleCisco and Intel Launch Private 5G Innovation Centers
In an expanded collaboration with Intel, we’re giving partners and customers an exciting opportunity to access three new innovation centers that will serve as test beds for enterprises seeking to e…...
View ArticleCalling, the Cloud, and the New Era of Collaboration
Migrating to Cloud Calling is a priority for many organizations seeking better visibility, flexibility, and functionality with reduced total cost compared to on-premise Calling—without sacrificing t…...
View ArticleUsing SD-WAN for securing distributed renewable energy
Renewable energy is a rapidly growing segment of the energy industry. Technologies such as wind, solar, biomass, geothermal, and energy storage are now considered mainstream. However, all of these…...
View ArticleSintrex Wins 2024 ThousandEyes Integration Partner of the Year EMEA
Partners serve as the lifeblood of Cisco and form an essential part of the backbone that supports thousands of businesses across Europe, the Middle East, and Africa (EMEA). They play an integral… Read...
View ArticleDrive Your Cybersecurity Platform Transformation: Lead the Way With SSE
By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are… Read...
View ArticleSustainability 101: What are ecolabels?
Do you feel a bit lost when people refer to certain environmental sustainability topics and aren’t sure where to start when it comes to learning more? Sustainability 101 is a blog series that you can …...
View ArticleDevNet Sandbox Has a New Look & Feel
If you’ve played in the DevNet Sandbox lately, you probably noticed some changes. Well, it’s a lot more than a repaint. It’s a full forklift upgrade. The changes you see are a complete re-fit of the e…...
View ArticleThe Quick and Easy Solution to Lagging 5G Monetization
Looking for a quick and easy solution to lagging 5G monetization? Here’s a hint: it’s not just about the G. Initially hailed as a global savior, and more recently labeled a disappointment, the rea…...
View ArticleBenefits of Ingesting Data from Amazon Inspector into Cisco Vulnerability...
Co-authored by Tejas Sheth, Sr. Security Specialist, Amazon Web Services – AISPL. Risk-based Vulnerability Management (RBVM) represents a strategic approach to cyber security that focuses on… Read more...
View ArticleEvolution to 5G-Advanced and Beyond: A Blueprint for Mobile Transport
The rapid rollout of 5G technology has marked a historic milestone in the evolution of mobile connectivity. According to research firm Omdia, 5G subscriptions surged from 1.4 billion in the middle of…...
View ArticleWhere Is DevNet Going Over the Next 10 Years, and Beyond?
Wow! It’s been 6 months since I wrote my last DevNet 10-year blog, ruminating on the creation and history of Cisco DevNet. Since then, the marking of our 10 year anniversary has exploded with i… Read...
View ArticleGenAI will Transform B2B Interactions and Solutions in the Year Ahead with...
Human-like interaction with B2B solutions, bespoke multimodal LLMs for better accuracy and precision, curated workflow automation via LAMs and customized B2B applications will become the norm as… Read...
View ArticleEnabling Network Engineering Skills in an AI World
Artificial intelligence (AI) has become a common buzzword, especially with the rise of Generative AI (GenAI) tools like ChatGPT, which can create entirely new data and human-like content. However, AI…...
View ArticleEnterprise security: Making hot desking secure and accessible on a global scale
Making hot desking secure and accessible on a global scale The first rule of interviewing a CISO at the Australian division of Laing O’Rourke is this: You can’t dig deep into use cases or cli… Read...
View Article