The annual NBA Draft is all about finding the latest and greatest basketball talent; players who will someday become the face of franchises around the league. It's where their lifelong dreams of playing in the NBA become a reality...
On Friday, billions of people will tune in to watch or listen to the start of the greatest sporting spectacle in the world. As a sports fan, I am excited to see the amazing performances to come, and already prepared with a box of ...
By Ted Rose, Operational Security, Service Provider Video Software and Solutions, Cisco Our security team already blogged about the complex realities of securing digital video content back in April, when attendees of the National ...
Life is what happens to you while you're busy making other plans.-John Lennon Giving back to the community is an important part of Cisco culture, and Cisco encourages volunteerism. They make it pretty easy, too, by planning volunt...
We live in the age of digitization. Digital tablets are replacing books, we get our news from RSS feeds instead of newspapers, "records" are being released as MP3s, and cars will soon be driving themselves. Yet at the same time, m...
Visibility has always been a core component of building effective security policy. Starting with the discovery phase of understanding the behavior of the users and assets on a network through the effective monitoring of the policy...
In February, Tim Banting of the Business Technology and Software group at Current Analysis, produced a report analyzing the growth and changes around SoCoMo Platforms. I've summarized the focus and themes of that report below. Whe...
We all know that there's a lot of hype around cloud computing. While many companies won't move their data to a public cloud anytime soon, the private cloud option is very compelling. IDC estimates thatspending on private...
As schools, colleges, and universities become more connected, it opens up a world of possibilities for students. The IT market suggests today we have around 15 billion devices utilizing an IP address, and that number is expected t...
To prevent a security breach and loss of critical business data, security teams must be diligent in defining, identifying, and classifying security gaps in their organization's network. Many security teams conduct pentesting as a ...
Change is tough. True transformation is even tougher -especially when we are talking about the transformation of your tried and tested networks to a new software-defined model with Cisco's Digital Network Architecture (DNA). And t...
Cisco has shared a long-standing and successful relationship with Victoria University (VU). VU is committed to accelerating its transition to a digital campus to enhance student engagement, deliver productivity savings and increas...