Cisco Tech Blog

Learn about the latest tech innovations and engage in thought leadership news from Cisco.

How to enable long-distance quantum communication?Network Profile at 20 Years: How Do You Build Innovative, Enduring Services? The Tacit Knowledge Blog Series 6/6The Tacit Knowledge Blog Series 5/6The Tacit Knowledge Blog Series 4/6The Tacit Knowledge Blog Series 3/6The Tacit Knowledge Blog Series 2/6The Tacit Knowledge Blog Series 1/6OpenTelemetry and AWS Lambda5G Private Networks and 5G Use Cases Networks of the FutureLessons Learned from Using AWS Cloud DirectoryDoes your observability stack up?Cisco Research marches towards democratizing federated learning Design Insights - How Cisco is Pushing the Boundaries of Customer ExperienceTackle API Security with the CVSS Vulnerability Scoring SystemTransferring Data with AWS Data SyncHow Panoptica Secures GitOps to Protect CI/CD Pipeline ToolsSeeing the Unseen: Gaining Visibility into API Payload EncryptionBenchmarking Deep Neural Networks on Edge Devices, using different frameworksBuilding and Deploying an AI Application on K3sFoundations of NLU – Word Representations5 Reasons DevOps Should Integrate Apache Airflow & Great ExpectationsCode Integrity Risks: The Overlooked Wrinkle in Serverless SecurityTell your SD-WAN about your Service Mesh External Services!Breaking Up with Radio Waves: Why LiFi Is a Great Solution for Wireless NetworksThe Ultimate Cloud Native Security GlossaryWhy Data Models Rule the Enterprise Network WorldEvent-driven multicluster autoscaling with CalistiOptimize Your Data Pipeline with Apache Airflow and Great ExpectationsWhy Now Is the Time for CISOs to Embrace CNAPP for Cloud Native SecurityWhy Network App Hosting is Taking Off in Enterprise Companies5 Real-World API Security Breaches from 2021Securing API Calls in Kubernetes, a simple and effective ApproachNew Scale and Simplicity for Enterprise Networking Software Upgrades and PatchingOpenTelemetry and Epsagon - a Love Story in Three ActsHow to Implement Circuit Breaker PatternsUT Austin and Cisco Form Research PartnershipDecentralized Identities DemystifiedGetting Started with AWS Lambda in .NETCisco and Ohio State launch research collaborationCloudTest- Run tests with a repeatable multi-cluster Kubernetes environmentArtificial Neural Networks and Leadership Not So DifferentIssue Management and Error TrackingUsing Deployment Markers to Enhance ObservabilityIntroduction to Synthetic MonitoringThe Importance of Application and Infrastructure-Level Dashboards in Cloud EnvironmentsHow to choose a practical front-end framework for your following POC?Logging impact application performanceOSS API traffic visibility in K8s clustersProtected: Getting Started with AWS Lambda and RubyTroubleshooting Using Prometheus Metrics in EpsagonRecruiting Sharks as Climate TrackersAutoscaling Kinesis Data Streams in EpsagonMaking the Most Out of OpenTelemetryShifting Left API Security - APIClarity Provides the Foundation for Continuous API ComplianceMy Intern Experience with Cisco ResearchThe Case for Supply Chain TransformationCisco Research taps into broader research community for next-generation Quantum researchApache Kafka and Bytecode InjectionCisco announces strategic partnership with Carnegie Mellon CyLabIntroduction to SeccompUpstack Your Thinking - With APIClarityShould you run Apache Kafka on Kubernetes?APIClarity, a New Open Source Solution to Ensure API Visibility & Enhance API SecurityQuantum CollaborationAutomated Policy for developers using CI/CD (Terraform) toolsHardening Kubernetes Containers Security with SeccompDrowning in Data and Starving for Insights - Episode #3: Application of Topological Data Analysis to TelemetryAI 2.0 - Episode #1, IntroductionData Migration from MariaDB to Redshift using AWS Data Migration Service (DMS)Access S3 Data in Amazon Redshift using Redshift SpectrumSimplifying account-based billing through AWS organizational setupDrowning in Data and Starving for Insights - Episode #2: What is Topological Data Analysis?Collaboration with Cisco Explores Frontier of Data TechnologiesDrowning in Data and Starving for Insights - Episode #1: Swimming in Sensors and Drowning in DataAI Ethics: Listening to StakeholdersIntroducing Media Streaming MeshConveying Clearly and Concisely: Cisco Internship ReflectionTowards More Inclusive InfrastructureHow We Built a Networking-Specific Natural Language Semantic ParserInside Kubernetes Network PolicyInside Kubernetes NetworkingWhat is Infrastructure as Code?Why AGI Matters TodayUnderstanding and Applying Container SecurityMitre ATT&CK framework: What is it and does it work for K8s environment?AI Beyond Deep Learning