Introducing the Network Programmability Video Course
The Network Programmability Basics Video Course is a collection of 28 videos organized into 6 modules. We created it to help jumpstart your journey into network programmability. It's LIVE now!
The Network Programmability Basics Video Course is a collection of 28 videos organized into 6 modules. We created it to help jumpstart your journey into network programmability. It's LIVE now!
Most of the development world is aware of the microservices and containerisation movement, given we’re now in 2018! When folks start working with microservices, they quickly realise that they proliferate fast. One application can contain a large
You’ve probably heard of blockchains by now – the relatively new technology underpinning a whole host of cryptocurrencies and distributed apps. Blockchains promise exciting solution opportunities across a range of markets, from IoT and
This is what DevNet sandbox is all about. Providing access to real world security environments where one can see first-hand how these integrations work.
This blog is the second in a series of two, focussing on DevNet Sandbox and the awesome free access to Cisco and Open Source tech it provides all our DevNet users. In my Part 1 blog I explained how DevNet Sandbox provides great fast, on-demand access
This blog is the first in a series of blogs focusing on DevNet Sandbox and the awesome free access to Cisco and Open Source technologies it provides all our DevNet users. I’m a developer. I’m also somewhat an architect, manager and evangelist which
Over the last half decade the term sandboxing has become so pervasive, many customers I speak to have forgotten what it’s for! Sandboxing is a type of malware analysis – dynamic malware analysis to be exact. You execute a sample / file in a virtual
Indicators of Compromise (“IOC”) are used to suggest a system has been affected by some form of malware. An Indicator of Compromise can be anything from a file name to the behavior observed while malware is actively running on an infected system.
A few years ago sandboxing technology really came of age in the security industry. The ability to emulate an environment, detonate a file without risk of infection, and analyze its behavior became quite a handy research tool. Since then, sandboxes