If you look back at the Cisco UCS launch on September 4th, and VMworld SF justprior, the last 4 weeks have been a tsunami of solution innovation milestones in unified computing, ie: where the next wave of Unified Computing is taki...
This week, our#IoTChatco-host is Zebra Technologies (@ZebraTechnology)! We'll be talking about device management and IoTPlatforms. Zebra Technologies is one of the sponsors for the Internet of Things World Forum in Oct...
No doubt, these are exciting times for service providers. With the massive transformations that are happening nowadays in the industry and marketplace, being at the center of it all presents a huge opportunity. Well, this is...
Last week we announced the availability of Cisco ASA with FirePOWER Services, which represents the industry's first threat-focused next-generation firewall (NGFW). This offering addresses threats across the full attack contin...
#CiscoChampion Radio is a podcast series by Cisco Champions as technologists. Today we're talking with Cisco Technical Marketing Engineer Craig Brown, about Cisco Modeling Labs. Lauren Friedman (@Lauren) moderates and Brad Ha...
As organizations seek ways to maintain real-time connections with their workforceandcustomers in an increasingly digital and mobile-centered world, the growth of mobilecloudwill be a major force in shaping the business landscape...
In this new era of big data, every savvy Partner wonders how can we use more customer intelligence to fuel our business. How do we use it to gauge when to approach customers? How do we use it to identify new opportunities, migrate...
The Internet has emerged as one of the most powerful ways for businesses and consumers to communicate and learn. Its global reach, accessibility and speed have opened doors to areas of knowledge that in the past were available onl...
I recently read the rather interesting announcement from NTT DoCoMo where they demonstrated LTE running over the unlicensed 5GHz band. They report a 60% increase in spectral efficiency over IEEE 802.11n Wi-Fi. The arti...
Big Data is not just about gathering tons of data, the digital exhaustfromthe internet, social media, and customer records. The real value is in being able to analyze the data to gain a desired business outcome. Those...
In the past, a critical component of preventing threats was understanding and controlling network access and access to network resources based on role, while also denying access for unauthorized users and devices. However, assurin...
In today's data centers, organizations want to further accelerate application deployment, resulting in even greater demands on the IT infrastructure. The need for speed and efficiency is paramount and keeping pace with dynami...