Whether you're a clinician or an executive, the healthcare workforce experience can be equal parts rewarding and challenging. There are changing regulations. A never-ending stream of patients with time-sensitive needs. The pressur...
Introduction As companies strive to become digital enterprises, they need to make the best use of their existing assets and infrastructure, while introducing new technology and tools that drive the business forward. ITSM is one of...
Webex has come a long way. We recently unpacked a lot of great innovation in the new meetings experience. The great thing about Webex Meetings is that it's a full video and content-sharing cloud solution that you can join via desk...
When a nascent technology starts to take off, people talk about the inventors as "pioneers," evoking pictures of rough-and-tumble loners going it alone. But when it comes to developing a distributed ledger technology like blockcha...
A Chicago area school district knew their technology wasn't making good grades. Their data center and Wi-Fi systems were too old to keep up with new teaching styles. Students were working on laptops that often couldn't connect, an...
Talos is disclosing two denial-of-ervice vulnerabilities in Pixar's Renderman application. Renderman is a rendering application used in animation and film production. It is widely used for advanced rendering and shading in many la...
This blog was collaboratively written by Lou Ronnau, Scott Bradley, and Dan Maunz on the Cisco Customer Assurance Security Programs (CASP) team. One of Cisco's guiding principles is to protect the security of our customers' ...
525,600 minutes. An iconic Broadway anthem immortalized this number as the total number of minutes in a year. At Cisco, we have spent many of these last 525,600 minutes developing, innovating and working together with ...
This is the last of my "Cable Story" blog series, and what better way to finish it other than discussing automation? Why, because it stands to be the most important thing that service providers can do today to streamline their bus...
You might be familiar with public blockchains - the underlying technology powering cryptocurrencies like Bitcoin - but not yet sure how private, enterprise blockchain could work for your company. You're in good company: Blockchain...
Talos is disclosing a remote code execution vulnerability in the Microsoft wimgapi library. The wimgapi DLL is used in the Microsoft Windows operating system to perform operations on Windows Imaging Format (WIM) files. WIM is a fi...
Earlier this week we unveiled an important evolution to our intent-based networking suite: Platform capabilities for DNA Center. It gives Cisco partners and customers a way to program applications that take advantage of their netw...