We've reached the midway point in 2016 and now's the perfect time to reevaluate -or even re-think -your current growth strategy. Traditionally in our industry, business growth has been built around gaining market share: adding new...
Vulnerabilities discovered by Aleksandar Nikolic. Blog post authored by Jaeson Schultz and Aleksandar Nikolic. One of the most fundamental tasks performed by many software programs involves the reading, writing, and general proces...
The Digital Economy is rapidly changing our world -seemingly as quickly as you can read this sentence there will be 50 billion devices connected to the Internet (Forecast by 2020: Cisco Internet Business Solutions Group). The Inte...
We welcome and strongly support Microsoft's successful challenge of a federal criminal search warrant for messages stored on an email server located in Ireland. The decision from the US Second Circuit Court of Appeals supports the...
Learn more from Monica Paolini from Senza Fili and RCR Wireless Last week, my children used Facetime to chat with me while I was traveling to hear the latest Cisco developments at CiscoLive in Las Vegas. While they love seein...
Hello! My name is Kevin Wood, and I am a retail business architect here at Cisco for both Retail and Hospitality. I have done a lot of work providing security to retailers -one of the most vulnerable industries in the world today....
Every year the Symposium on Usable Privacy and Security brings together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy, to present and discuss the latest research i...
Cloud platforms are increasingly a viable option for a growing set of enterprise applications and workloads. Application teams are uncompromising in their desire to build and deploy new applications into public cloud e...
The mobile revolution has only just begun... The number of terminals is growing exponentially and the use of video is an ever-increasing trend. A growth of 53% of the yearly mobile data traffic is forecast by 2020. In a context of...
Earlier this month, I attended a unique, one-week program at the IMD Business School in Lausanne with 400 executives from all over the world. Theprogram was named "Orchestrate Winning Performance: How to survive and win in today's...
Vulnerabilities discovered by Tyler Bohan of Cisco Talos. Many of the wide variety of file formats are designed for specialized uses within specific industries. Apple offers APIs as interfaces to provide a definitive way to access...
Technology changes like the weather -often. Today's IT environment is ever evolving and vastly different than it was just five years ago. Data and analytics dominate the conversation and everybody is still trying to figure out how...