Your Valuable Source of In-depth Technical Information
You probably noticed that the IT (being high on the list of nice-to–be-in industries) attracts more and more youngsters who believe career development is all about reading white papers. This attitude inevitably leads them to achieve only "talking–head" level of technical expertise. Ironically, they're usually the ones who provide tons of new white papers in the years to come...
Our industry needs more meat on the bones – useful advice from senior experts who started their careers in 80' or 90' and managed to keep the pace with technology (r)evolution until today. The ones who learned the hard way what an IT manager and his team is facing on a daily basis. Those who know that the technical excellence itself is useless if it doesn't contribute to the company bottom-line and make your life easier.
Who is affected by the Meltdown and Spectre vulnerabilities and how can you protect your IT environm... more
DDoS attacks are relatively inexpensive and easy to execute, so every organization is a potential ta... more
Hackers can exploit the KRACK attack to intercept encrypted wireless traffic and thereby steal your... more
What’s not to love about the pay-as-you-go model of cloud computing? Your service price is distribut... more
Learn how to set up a reliable, secure, and fast wireless network in your organization that won'... more
Call Home is an e-mail-based real-time alert mechanism on Cisco routers. It provides a range of mess... more
Network Configuration Protocol (NETCONF) is a standardized network management protocol that provides... more
In a modern, BGP enabled network, where a service provider can peer with dozens of other carriers, i... more
Wireless Clients - The Real Story
Understand the issues introduced by wireless clients in this CWNP webinar. Topics covered include client types and capabilities as well as sources you can use to locate detailed information about clients.
Introduction to Segment Routing
Learn how Segment Routing architecture came into the existence and its evolution from MPLS and IP Routing.
Related training: Implementing Segment Routing on Cisco IOS XR (SEGRTE201)
Enterprise Network Automation with APIC-EM
The video provides technical deep dive and demonstration of the latest advancements inside Cisco’s purpose-built network controller. See how it automates tasks, orchestrates workflows and policies, and massively simplifies operations from the branch office to the data center. Watch the video and learn how Cisco’s APIC-EM delivers comprehensive end-to-end network control, plus the flexibility to easily deploy any services you need for your business.
Introduction to Cisco Advanced Malware Protection (AMP)
Learn about the core Cisco Advanced Malware Protection (AMP) functionality and gain an overview of AMP's core features, including cloud-based file reputation lookups, dynamic analysis with Threat Grid, and retrospection.
Related training: Protecting Against Malware Threats with Cisco AMP for Endpoints (SSFAMP)