Security has emerged as a leading pain point for CIOs, executives, and even in the boardroom due to changing business models and growing attack surfaces, a threat landscape that is more dynamic by the day and the increasing complexity of IT
At the start of 2014, SAP identified four corporate priorities: HANA, Cloud, Mobility, and Analytics. Cisco, in support of these priorities, expanded their partnership with SAP to announce the availability of a Cisco Cloud Reference Architecture for
Another successful ANGA COM for Cisco. The event itself attracted 17,000 visitors and 1,700 participated in the Congress, listening to over 100 speakers – both areas attracting more people than last year – this is indeed a growing show! Cisco was well
The 4th annual Future of Cloud Computing Survey is underway! Cisco, along with North Bridge and Gigaom Research, and over 60 industry collaborators aim to explore the types of cloud computing technologies being used today and in the future. Please
Written By George Tupy, Marketing Manager, Cisco Service Provider Video For TV service providers, one of the key promises of cloud architectures is the ability to innovate at Internet speeds. This enables a host of business outcomes, including new
At CiscoLive this week, I am proud to announce the launch of the new Aggregation Services Router, the ASR 1001-X. The ASR 1001-X is the latest addition to the ASR 1000 family of routers that packs 20Gbps forwarding capacity and 8G of Layer 3 Crypto
In this week’s very first bilingual episode of Engineers Unplugged, shot in Milan, Matteo Pirelli and Luca Relandini (@lucarelandini) talk about the people part of cloud. This episode is NOT lost in translation: organizational support for cloud
Written by Nick Thexton, Vice President and CTO, Service Provider Video Software and Solutions, Cisco With almost a quarter of our waking time spent watching TV, video consumption is on a definite rise. Rather than competing, different devices and
Recently, a bug in Internet Explorer made it possible for hackers to take over a user’s computer causing government agencies to suggest using a different browser. The Heartbleed flaw opened the door for encrypted data to be intercepted. These latest