technical
CryptXXX Technical Deep Dive
10 min read
0.0 Introduction: In our previous post we discussed the AMP ThreatGrid Research and Efficacy Team’s continuous support for Ransomware attack vectors, generic behavior detection of un-discovered variants, and the creation of behavioral indicators once new variants are identified. In this post we’ll be discussing one of the more prevalent variants to surface in the wake […]
Lead Beyond—Accelerating Legendary Women #CiscoChat
2 min read
The IEEE Women in Engineering International Leadership Conference is designed to inspire and engage, women in engineering. In a field that’s overwhelmingly male, it can be difficult as...
What, Why, Where, When, How: The New FCC Ruling Around 5 GHz
3 min read
You don’t need me to tell you to know that we are in the midst of a technology revolution. It’s mobilizing the internet. And it’s transforming the way billions of...
Congratulations to 2013 IEEE-SA International Award Recipient Andrew Myles
1 min read
Earlier this week, the IEEE Standards Association (IEEE-SA) announced the winners of the 2013 IEEE-SA Awards to honor standards development contributions. We are pleased to announce that Andrew Myles, Engineering Technical Lead at Cisco has been awarded the IEEE 802 SA International award for his extraordinary contribution to establishing IEEE-SA as a world-class leader in […]
Deep Dive: Mobility Services APIs (with Sample Code!)
8 min read
Last week, my colleague Rajiv walked you through an overview of how our Mobility Services API now supports REST based APIs. As a developer for the Mobility Services Engine...
FlexPod with Microsoft Private Cloud – Best Practices Webcast
1 min read
Cisco and NetApp continue to drive innovation with new FlexPod offerings that enable organizations to address their business needs while reducing risk and increasing IT efficiency and agility. FlexPod combines the Cisco Unified Computing System, Cisco Nexus data center switches, and NetApp storage components and provides a powerful platform for critical application workloads. With joint […]
3