integration
Security’s Vicious Cycle
Security Reimagined — Solving an Old Problem with a New Approach A decade ago this January, Steve Jobs challenged the conventional wisdom about tablets, unveiling the iPad with the words, “What this device has done is extraordinary.” Coming on the heels of iPhone’s smashing success three years earli…
3 Keys to Enabling DoD’s Comply-to-Connect
Co-author: Chad Mitchel | DoD Technical Solutions Architect at Cisco The U.S. Department of Defense (DoD) has long been on the forefront of technology innovation when it comes to increasing mission success. But as technology evolves, so does the cybersecurity threat landscape. This m…
The More Intuitive Way to Learn
The annual Educause conference starts today, and educators from all over the world will be flocking to the Rocky Mountains to learn about the latest in education innovation. There is a lot to be excited about, as new learning models and technologies are helping educators at institutions of all sizes…
Third-party Integrations Simplify Webex Meetings
We know that the canvas you work in includes many different collaboration tools, productivity tools, and devices. When all those elements work together, you can work more efficiently. That’s why our approach is an open collaboration canvas: We are making sure the Webex portfolio works with the third…
Cisco Collaboration: We Can’t Imagine a World without Microsoft
As CTO for the collaboration group at Cisco, I get asked this question all of the time – are you guys committed to a multi-vendor environment with Microsoft? Gosh, I find this a frustrating question. Why is that? Because most (not all, but almost!) customers we sell to also have Microsoft products i…
Low Price Can Be Expensive
No one today would dispute the importance of information technology in the modern world. But as federal IT budgets shrink and the threat of persistent cyber adversaries increases, we are seeing a tension between the need to reduce IT procurement costs and the imperative to remain agile and vigilant…
Integration, Consolidation, Automation: Why Cisco Cyber Solutions are Essential for CDM
Cybersecurity for the federal government is increasingly complex. More and more important data is being stored or shared using the Internet, and at the same time, hacks and other cyberattacks are becoming more sophisticated and frequent. Agencies need to stay on the cutting-edge of cyber solutions t…
Guest Blog: Never Over or Underestimate Cloud Security, Integration or APIs
Today’s Guest Blog comes to us courtesy of Dante Orsini, SVP of Business Development at iland. Taking advantage of all that the cloud has to offer is no small order. That’s because extending your on-premise data center resources into the cloud completely changes how you scale performance, assu…
5 Themes We Heard at DistribuTECH 2016
I just got back from the 26th year of DistribuTECH, the largest annual Electric Utility Industry conference. The theme was “Focused on the Future” and the industry met to participate in sessions on working through the challenges of increasing the amount of power from renewable resources, managing th…