automation
Secure Network Analytics (Stealthwatch) Then, Now and Beyond – Part 3: Into the Future
3 min read
The final part in our look at the past, present, and future of Secure Network Analytics. We’ve looked at the origins of the product formerly known as Stealthwatch and now it’s time for us to look ahead as we consider what the future holds.
The Why of AI and ML
3 min read
While artificial intelligence (AI) and machine learning (ML) have been in the spotlight in recent years, the central questions around them have focused more on what they are and how they’re used. While these are important questions, it’s time that we shift the conversation to why we need AI and ML so we can better understand the roles they play in our lives.
Software Skills Give Network Pros Super Powers
3 min read
Add software skills to your networking teams' toolkits to help them solve your most important challenges.
Cisco DevNet Community 2020
1 min read
Cisco DevNet is your home for everything programmability with Cisco. Join the global developer community, working with Cisco APIs, to drive innovation.
Visibility and Insights = Optimal Customer Experience
2 min read
Do you have the visibility and insights needed to redesign and secure your workforce? It's crucial for IT to have these trends, in order to take the right action — to deliver the best possible user and application experience.
What’s Your Business Resiliency Plan?
5 min read
What’s your Business Resiliency plan? Learn how Cisco’s business resiliency plan empowered teams to work from anywhere, added built-in security into every solution, and automated platforms for additional agility.
Experience the Future with Cisco and the Internet of Things
4 min read
Learn about how Cisco's new Internet of Things solution, Application Hosting on the Catalyst Access Points, changes the game by providing the ability to deploy custom IoT applications directly onto Cisco's 9100 series Wi-Fi 6 access points.
Ports: A Complex Environment Transforming with Automation
6 min read
Learn how automation is transforming the ports industry in part three of three of our Transforming Industries with Autonomous Operations series.
Defense in Diversity
2 min read
Security has favored “Defense in Depth” as the dominant strategy. As we enter the world of automated workloads at internet-scale, it is clear that “Defense in Diversity” wins over depth.