- Our Favorite Topics:
Identify Weak Links in Your Application Stack – Part 2, Anomaly Detection
2 min read
How can you learn what’s normal, and flag when abnormal behavior of an application is detected? This blog gets you started with how to configure anomaly detection and associate actions when violations are detected.
Identify Weak Links in Your Application Stack – Part 1, Health Rules
2 min read
See how Cisco Cloud Observability helps you tightly integrate with your cloud providers to collect data that can then be used to correlate and contextualize to achieve real-time observability across their entire technology stack.
Automating Observability of Public Cloud Deployments with Cisco Cloud Observability APIs
1 min read
Automations for setting up observability across various cloud vendors – with a single set of APIs - will allow enterprises to focus on their mission critical business applications and user experience rather than dealing with the proprietary methodologies of individual clouds.
Cisco Announces Availability of OpenCSMP
3 min read
Secure, scalable management for constrained IoT networks - the formerly proprietary CSMP protocol used in Field Network Director is now available in an open source version.
Accessing the Power of AI-led Digital Transformation with API Abstraction
3 min read
See how this year, like no other, organizations will tap into APIs to sidestep the complexity and cost of developing and maintaining their own AI solutions and models.
Cisco Live EMEA 2024: Highlights from DevNet
3 min read
See a photo gallery of highlights from the DevNet Zone at Cisco Live EMEA 2024 in Amsterdam.
Tune In: Simplifying Network Automation with NetGru
2 min read
Here's help for being a network engineer in the age of automation and programmability. Mark your calendars to tune in to the weekly live stream "Simplifying Network Automation with NetGru." Wednesdays at 9:00AM PT.
Try the New “Recommendations” Feature in Cisco Code Exchange
1 min read
A quick search using a product name or technology can lead you to some promising results.
Securing APIs From Left to Right (and Everywhere in Between)
13 min read
Everything is accessible 24x7 through APIs - from non-critical functionality (music streaming and social media) to extremely critical data (financial accounts and healthcare profiles). Here are some ideas to make APIs your first line of defense for an application (and it's data).