DevOps in Action! – How We Built the DevDash Demo
See how we built a bare metal, portable Kubernetes cluster with Raspberry Pis... used the FARM framework to implement a client/server web application... and built and published docker containers to build a real microservices-based application.
Reliable Connectivity for Electric Vehicle (EV) Charging
The increase in electric vehicles on the road is, unsurprisingly, resulting in an increased demand for charging infrastructure. Public and private networks are being installed at a rapid pace and will continue to increase as more public funding is allocated to charging infrastructure.
Meet the 2022 Cisco Customer Experience Heroes
At Cisco CX, our customers are our heroes. We are honored to work with change makers, innovators, and trailblazers who have partnered with our teams to achieve industry-leading and transformational outcomes for their businesses. We value the opportunity to help our customers embrace their possible.
Edge Native Applications Are Conquering the Smart Device Edge
See how cost-effective, compact compute devices enable applications to leverage AI/ML, computer vision and AR/VR. And enable uses-cases such as automated theft protection, predictive maintenance, autonomous driving, digital signage, and remote expert assistant
Cisco IoT: Connect, automate, and operate – anywhere!
To help you create demand, and help customers continue to invest, Cisco is announcing two additions to our IoT product portfolio to meet Industrial networking production environment requirements.
Manufacturing In Flux
As the world begins to move into "the new normal" manufacturers are gearing up their factories and plants for operational efficiency while securing their intellectual and physical property for the future and I couldn't be more excited to witness this evolution.
Drive Repeatable and Scalable Solutions with Cisco IoT Offers
Industrial networking production environments are evolving faster than ever. As a result, many customer networks are not ready for the new explosions of data this produces or evolving cyber threats.