EN Hackathon 2022 Produces Stunning Innovations from 1600+ Participants in Cisco Enterprise Networking
This year's Cisco Enterprise Networking Hackathon, held globally on October 11-12, was another huge success.
EN Hackathon – Hack@Home 2021
This year's Cisco Enterprise Network Hackathon is virtual, international, and bigger than ever before. Starting on March 8, 250+ teams and more than 1,000 participants will compete.
Rushing into New Opportunities: The Innovation Pipeline
Rashmi, a User Experience Engineer, shares her story about taking part in Cisco's Innovation Pipeline and what the experience meant to her.
Running Code for the Win at IETF Hackathon in Montreal
IETF Hackathon in Montreal hits its goals for advance the pace and relevance of IETF standards, and attract developers and new people to IETF.
Cisco DevNet Partnering with Smart India Hackathon to Help Digitize the Country!
Cisco DevNet is supporting student innovation in India as a technology partner of the Smart India Hackathon 2018.
IETF Hackathon Closes Loop Between Open Source and Standards
The first ever IETF Hackathon was held March 21-22, the weekend before IETF 92 in Dallas, TX. It was a late addition to the conference schedule, answering the call to action from Engineering CTO and Chief Architect Dave Ward’s talk at IETF 91, Open Standards, Open Source, Open Loop. Cisco DevNet teamed up with IETF […]
Opportunity Hack: Driving Social Impact with Passion and Technology
From October 28 to November 3, Cisco, in partnership with PayPal, Intuit, and Coding Dojo, sponsored the 5th annual Opportunity Hack.
When Strangers Become Friends and Make an Impact Together!
Lori P. shares her four tips for great teamwork.
VivaTech Hackathon Explores Cisco CMX and Spark
Using CMX (Connected Mobile Experience) to track devices We had an amazing hackathon at VivaTech in Paris France last month. 10 person teams were assembled with the purpose of using Cisco Technologies to improve the conference experience! Cisco mentors and staff were on site and provided access to multiple technologies for the hackers to use. […]