I promised a follow up in my recent blog about Facebook's new Bryce Canyon storage platform. While the title of this blog may sound like it questions the new platform's capabilities. It like the previous blog aims to help you unde...
This post was written by guest blogger Yuji Suzuki, Manager of Japan Manufacturing Operations. Think of a large piece of Cisco equipment, like a carrier-class router. Now picture the product's shipping carton: it's a side car...
Late last year, I compared Cisco's S3260 Storage Server to Amazon's S3 service. The results shocked a lot of people and spurred a lot comments on the blog. It's worth repeating from the last conversation on this topic that there ...
The Marketing Velocity Live Event (Chicago, April 25-27) is just around the corner. To say I'm excited is an understatement. This is our 10thyear conducting this invitation-only event that challenges and educates our partners abou...
On Friday, April 14, the actor group identifying itself as the Shadow Brokers released new information containing exploits for vulnerabilities that affect various versions of Microsoft Windows as well as applications such as Lotus...
Over the past week, information regarding a serious zero-day vulnerability (CVE-2017-0199) in Microsoft Office was publically disclosed. Since learning of this flaw, Talos has been actively investigating the issue. Preliminary rep...
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between April 7 and April 14. As with previous round-ups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the ...
As more and more businesses make the shift to digital, questions of cybersecurity continue to arise. This is especially true in industries that have a lot at stake - industries like financial services. As digital transformation ra...
I am pleased to share some exciting news! Cable industry leader George Kajos is joining our Cable Access Business Unit and my leadership team as Senior Director of Software Engineering. George comes to Cisco with over 20 year...
Global analyst firm IDC recently named Cisco AMP for Endpoints a leader amongst endpoint security solutions in their report, "IDC Marketscape: Worldwide Endpoint Specialized Threat Analysis and Protection 2017 Vendor Assessment"&n...
Written by John Holobinko, Director Access Strategy, Cable Access Business Unit Traditional cable access systems can only transmit data in one direction across any part of the spectrum. Compared to PONs, a cable access netwo...
Thanks for following our 2017 E-rate and funding blog series. Did you get your Form 470 posted? Today is the last date applicants can file a Funding Year 2017 Form 470 while still allowing the required 28 days for competitive bidd...