It's DockerCon time again! We are excited to be the Gold Sponsor of the conference this year and looking forward to engaging with the community to accelerate the momentum in container adoption. If you are planning to attend this p...
A core responsibility in my role atCiscoSecurity is guiding ecosystem partners through the Solution Partner Program, executing daily on the Open and Automated pillars of the Cisco Effective Cybersecurity strategy. Over the past fe...
A little about me: I'm a Scorpio, a New Yorker, and am opening a new plant-based Mexican restaurant in China Town with my husband this month. Oh, and in August I will have celebrated my 11thanniversary with Cisco. In the pas...
For years, PowerPoint has dominated the solution selling scene, but the age of static slide presentations seems to be coming to close. Today, prospects and customers demand more. They want to see solutions in action. While PowerPo...
Each May students from all over Maine converge on the University of Maine as it hosts a summer student conference as part of the Maine Learning Technology Initiative (MLTI) 1:1 program. Last year, for the 13th year, over one thou...
Digitization is changing the world. All kinds of businesses, organizations and countries are going digital to innovate more quickly, compete more effectively and serve customers better. But digitization is also placing unprecedent...
Service providers are transforming their business using NFV based services and SDN enabled networks. But the pace of transformation has been slow. To find out why, Cisco recently conducted a study to understand the progress and ch...
The world travels more now than it ever has, with Americans alone logging more than 405 million long-distance business trips every year. Maybe you regularly contribute to that number? I know I do! I love working for Cisco, and in ...
In my previous blogs in this series, I shared the key aspects of the Innovation Funding Board (IFB) concept-from guiding principles and stakeholder roles to the innovation process itself. In closing, we'll look at some final...
Author: Ian Payton, Security Advisory EMEAR Introduction Too frequently security professionals only consider software vulnerabilities when considering the risks of connecting devices to their networks and systems. When it comes to...
Cyber threats have changed radically with the evolution of technology. Yet as threats continue to mount, many enterprises are still relying on yesterday's cyber protection methods, technology infrastructure, and cultural ethos as ...
As the cable industry prepares to transition towards distributed access architectures utilizing the CableLabs Remote PHY standard, it's starting to see the many benefits that RPHY can bring. One of those key benefits is around sim...