Join Tom Hollingsworth live from San Diego, CA as he covers the technology keynote from Cisco Live US 2019!
How do you know if you can trust your devices? What if they are the devices transporting data to you? Can you really know for sure? Tom Hollingsworth takes a look at how Cisco is security and validating service provider devices on IOS-XR.
Your IT News for the Week of March 25, 2019 Solving the Unstructured Data Problem The existence of large amounts of unstructured data not only continues every day in IT, but the volume of data itself has exploded. Despite IT’s efforts to corral this data, a need to understand and protect this data has grown […]
How hard is it to maintain old code? Can you keep upgrading architectures from the last decade indefinitely? When do you need to cut over to something more modern and familiar? Tom Hollingsworth takes a look at one such choice from Cisco in the realm of wireless controller software.
This week in Gestalt News, Stephen Foskett and Ken Nalbone led a great Gestalt IT Rundown, the On-Premise IT Roundtable discussed the role of sensors in analytics, and we debate if open source projects should fight strip mining. Subscribe to get it in your inbox each week!
Join Gestalt IT and Tech Field Day live from Cisco Live Europe in Barcelona, Spain! We will be live blogging the keynote address on Tuesday, January 29th at 9:15am CET. Follow along for the exciting announcements from Cisco!
Two-factor authentication is a simple security measure, right? What if you could take that and build on it to the point where it becomes a huge piece of your overall security posture? Tom Hollingsworth takes a look at Cisco’s recent Duo acquisition and how it can be leveraged for more than just a few factors.
If you’ve heard about Cisco Tetration but haven’t really dug into the details, you should check out Katherine McNamara excellent introduction to Cisco’s workload discovery, protection, and security solution. Once you get through that, be sure to checkout the rest of her series on Tetration: Introduction to Tetration Application Mapping Host Profile Katherine McNamara comments: […]
How long does it take to get value from your complex software platforms? How about less than an hour? Gian Paolo Boarina takes a look at the setup process for Cisco’s Network Assurance Engine and shows you how to get value from your installation in less time than it takes to eat lunch!
This is post 5 of 7 in the series “Cisco Network Assurance Engine” Previous posts in this series have discussed the theory behind Cisco’s Network Assurance Engine (NAE) and how it can help detect issues stemming from changes in the network. This post, in contrast, is mostly hands-on with the software. It includes screenshots showing […]