Last year, Cisco announced its vision to extend ACI into the public cloud domain and introduce key attributes -unified security policy, single-pane-of-glass management, and visibility -for Amazon Web Services (AWS), Google Cl...
How|encoding|and transport of the data-model gives you power and flexibility In the first blog, I attempted to make the point that the declarative approach of using function-specific modulesinAnsible is not scalable. In the second...
I know firsthand that Cisco Webex Meetings has made the online meeting experience easier than ever. Each month, 130 million people rely on Webex to collaborate better and work faster. With Webex Meetings, they now enjoy video conf...
This is an exciting day for healthcare IT leaders who've been working to integrate information technology into care delivery. Today, HIMSS Analytics announced its new Infrastructure Adoption Model or INFRAM. The INFRAM measures th...
It took over 20 years for the automobile to begin showing its dominance in transportation with the best-selling Model T. Even when the Model T saw its production end in 1927, the infrastructure and ecosystem for the car were still...
Nowadays when people think of Oil & Gas they tend to link this industry with pollution, depletion of natural resources and super-rich countries that base their economies and lifestyle on the extraction of these fossil fuels in...
It is no secret that the proliferation of connected devices and sensors has introduced new and growing security challenges across every industry and enterprise. The question is no longer whether or not a device or sensor is digita...
There's no silver bullet for online security, especially when it comes to user authentication. And enterprises aren't alone in the struggle to keep up with the needs and demands of authentication. At the center of all of this lies...
Small and midsize businesses are feeling the pressure to reduce costs, make workers more efficient and increase speed to market, among other 2018 top concerns revealed by SMB-focused analyst firm Techaisle. With limited ...
As George Box noted several decades ago, "All Models are essentially wrong, but some are useful". The work of statistical analysis, and its modern day derivatives of Machine Learning and Deep Learning, continue to be bold at...
To deliver powerful, intent-based networking, you have to have a solid infrastructure foundation that offers consistent performance, ease of use, and no compromise in security. Cisco Integrated Services Router (ISR) platforms trul...
Written in collaboration with John Moran, Senior Product Manager, DFLabs When a security incident occurs, it is unlikely that the entire scope and chain of events will be obvious from the outset. More often, it is a single indicat...