One of the challenges we're seeing in business today is the need to re-learn the problem solving process. This need is increasing demand for creativity as a critical competency of the consultant of the future -driven by how busine...
In the go-go-go marketplace that is pay television, one of the most important raw ingredients for success is the ability to rapidly respond to competitive interlopers of all stripes - online and over-the-top, in addition to the "k...
A new whitepaper from IDC, "The Workspace-as-a-Service Opportunity: Why Now is the Time for Desktop as a Service" is a must-read for any organization facing the challenge of delivering applications and services to employees on mob...
The FCC, acting on a petition from the hotel industry, has begun an interesting debate: when or whether hotels (or in principle, other enterprises) could ever block Wi-Fi on consumers' personal devices, like smartphones. For the r...
Business requirements define Applications. Applications run on IT infrastructure. If the IT infrastructure is more responsive to the needs of applications, then, it almost certainly guarantees better business outcomes. That is the...
Amid the technological sizzle at this week's Consumer Electronics Show is a special line of equipment and services, developed entirely for satellite video providers. And, as you might expect, it's a solution set being heavily fort...
[Note: If you like hearing these customer perspectives, register today for our upcoming live ACI webcast: "Is Your Data Center Ready for the Application Economy", January 13, 2015, 9 AM PT, Noon ET, featuring more A...
At CiscoLive Milan this year, we're going to be doing something a little different with Engineers Unplugged. Traditionally, Engineers Unplugged has been thisawesome video seriesfeaturing two speakers, a whiteboard, and great Data ...
This post was authored byAndrea AllieviandEarl Carter. Ransomware holds a user's data hostage. The latest ransomware variants encrypt the user's data,thus making it unusable until a ransom is paid to retrieve the decryption key. T...
The increasing pace of business is creating high demand for IT efficiency and speed. IT directly affects your ability to respond correctly and quickly to new opportunities. Slow IT equates to slow business. The latest releas...
Last month, Cisco added the VersaStack solution to our integrated systems portfolio. The new VersaStack solution leverages Cisco UCS integrated infrastructure with IBM Storwise V7000 storage. Cisco continues to partner with both l...
In 2013, our internal Information Security team carried out a series of controlled anti-phishing exercises. The purpose was to raise employees' awareness of potential spear phishing attacks through emails. Spear phishing has been ...