learn
Cisco Tech Blog
Learn about the latest tech innovations and engage in thought leadership news from Cisco.


How to enable long-distance quantum communication?
By Hassan Shapourian
Wednesday, February 1st, 2023


The Tacit Knowledge Blog Series 6/6
By Enzo Fenoglio
Tuesday, November 22nd, 2022

The Tacit Knowledge Blog Series 5/6
By Enzo Fenoglio
Tuesday, November 15th, 2022

The Tacit Knowledge Blog Series 4/6
By Enzo Fenoglio
Tuesday, November 8th, 2022

The Tacit Knowledge Blog Series 3/6
By Enzo Fenoglio
Tuesday, November 1st, 2022

The Tacit Knowledge Blog Series 2/6
By Enzo Fenoglio
Wednesday, October 26th, 2022

The Tacit Knowledge Blog Series 1/6
By Enzo Fenoglio
Tuesday, October 18th, 2022

OpenTelemetry and AWS Lambda
By Sami Musallam
Wednesday, October 5th, 2022



Does your observability stack up?
By Wei Wang
Wednesday, July 13th, 2022

Cisco Research marches towards democratizing federated learning
By Myungjin Lee
Wednesday, July 6th, 2022

Design Insights - How Cisco is Pushing the Boundaries of Customer Experience
By Gonzalo Salgueiro, Derek Engi
Monday, June 27th, 2022

Tackle API Security with the CVSS Vulnerability Scoring System
By Tomer Dvir
Wednesday, June 22nd, 2022

Transferring Data with AWS Data Sync
By Shiv Deshmukh
Thursday, June 9th, 2022

How Panoptica Secures GitOps to Protect CI/CD Pipeline Tools
By Tomer Dvir
Wednesday, June 8th, 2022

Seeing the Unseen: Gaining Visibility into API Payload Encryption
By Alessandro Duminuco
Tuesday, June 7th, 2022

Benchmarking Deep Neural Networks on Edge Devices, using different frameworks
By Alice Pagnoux
Tuesday, May 31st, 2022

Building and Deploying an AI Application on K3s
By Ben Ryder
Wednesday, May 18th, 2022

Foundations of NLU – Word Representations
By Jayanth Srinivasa
Tuesday, May 17th, 2022

5 Reasons DevOps Should Integrate Apache Airflow & Great Expectations
By Shiv Deshmukh
Thursday, May 12th, 2022

Code Integrity Risks: The Overlooked Wrinkle in Serverless Security
By Ariel Shuper
Wednesday, May 11th, 2022

Tell your SD-WAN about your Service Mesh External Services!
By Alberto Rodriguez-Natal
Monday, May 9th, 2022

Breaking Up with Radio Waves: Why LiFi Is a Great Solution for Wireless Networks
By John Parello
Tuesday, May 3rd, 2022

The Ultimate Cloud Native Security Glossary
By Rich Gold
Thursday, April 28th, 2022

Why Data Models Rule the Enterprise Network World
By Smitha Smitha, Paul Merlo
Monday, April 25th, 2022

Event-driven multicluster autoscaling with Calisti
By Cody Kai Hartsook
Friday, April 22nd, 2022

Optimize Your Data Pipeline with Apache Airflow and Great Expectations
By Shiv Deshmukh
Thursday, April 21st, 2022

Why Now Is the Time for CISOs to Embrace CNAPP for Cloud Native Security
By Ran Ilany
Wednesday, April 20th, 2022

Why Network App Hosting is Taking Off in Enterprise Companies
By Kalyani Gamare
Tuesday, April 19th, 2022

5 Real-World API Security Breaches from 2021
By Ran Ilany
Thursday, April 14th, 2022

Securing API Calls in Kubernetes, a simple and effective Approach
By Alessandro Duminuco
Wednesday, April 13th, 2022

New Scale and Simplicity for Enterprise Networking Software Upgrades and Patching
By Amit Nandy
Tuesday, April 12th, 2022

OpenTelemetry and Epsagon - a Love Story in Three Acts
By Yosef Arbiv
Wednesday, March 30th, 2022

How to Implement Circuit Breaker Patterns
By Ran Ribenzaft
Monday, March 14th, 2022

UT Austin and Cisco Form Research Partnership
By Nat Levy, UT Austin Cockrell School of Engineering
Wednesday, February 16th, 2022

Decentralized Identities Demystified
By Aviva Vaknin
Wednesday, February 16th, 2022

Getting Started with AWS Lambda in .NET
By Idan Kober
Monday, February 14th, 2022

Cisco and Ohio State launch research collaboration
By Ohio State’s Enterprise for Research, Innovation and Knowledge
Monday, February 14th, 2022

CloudTest- Run tests with a repeatable multi-cluster Kubernetes environment
By Shridhar Shah
Thursday, February 10th, 2022

Artificial Neural Networks and Leadership Not So Different
By Pallavi Kalapatapu
Wednesday, February 9th, 2022

Issue Management and Error Tracking
By Ran Ribenzaft
Monday, February 7th, 2022

Using Deployment Markers to Enhance Observability
By Chinmay Gaikwad
Monday, January 31st, 2022

Introduction to Synthetic Monitoring
By Chinmay Gaikwad
Monday, January 24th, 2022

The Importance of Application and Infrastructure-Level Dashboards in Cloud Environments
By Chinmay Gaikwad
Tuesday, January 18th, 2022

How to choose a practical front-end framework for your following POC?
By Stas Isakov
Thursday, January 13th, 2022

Logging impact application performance
By Liran Mendelovich
Wednesday, January 12th, 2022

OSS API traffic visibility in K8s clusters
By Sedky Abou-Shamalah
Tuesday, January 11th, 2022

Protected: Getting Started with AWS Lambda and Ruby
By Chinmay Gaikwad
Monday, January 10th, 2022

Troubleshooting Using Prometheus Metrics in Epsagon
By Chinmay Gaikwad
Wednesday, December 22nd, 2021


Autoscaling Kinesis Data Streams in Epsagon
By Ophir Yael
Tuesday, December 21st, 2021

Making the Most Out of OpenTelemetry
By Chinmay Gaikwad
Thursday, December 16th, 2021

Shifting Left API Security - APIClarity Provides the Foundation for Continuous API Compliance
By Torsten Volk
Wednesday, December 8th, 2021

My Intern Experience with Cisco Research
By Christopher Vattheuer
Friday, December 3rd, 2021

The Case for Supply Chain Transformation
By Lionel Florit
Tuesday, November 30th, 2021

Cisco Research taps into broader research community for next-generation Quantum research
By Carla Leigh
Thursday, November 18th, 2021

Apache Kafka and Bytecode Injection
By Adam Antal
Tuesday, November 16th, 2021

Cisco announces strategic partnership with Carnegie Mellon CyLab
By Daniel Tkacik
Thursday, November 4th, 2021

Introduction to Seccomp
By Lucas Barboza
Monday, October 18th, 2021

Upstack Your Thinking - With APIClarity
By Justin Cohen
Wednesday, September 29th, 2021

Should you run Apache Kafka on Kubernetes?
By Balazs Berta
Monday, September 27th, 2021

APIClarity, a New Open Source Solution to Ensure API Visibility & Enhance API Security
By Alexei Kravtsov
Monday, September 27th, 2021

Quantum Collaboration
By Andrew Masuda
Friday, September 24th, 2021

Automated Policy for developers using CI/CD (Terraform) tools
By Tomer Dvir
Monday, August 16th, 2021

Hardening Kubernetes Containers Security with Seccomp
By Erez Fishimer, Alexei Kravtsov
Friday, August 13th, 2021

Drowning in Data and Starving for Insights - Episode #3: Application of Topological Data Analysis to Telemetry
By Enzo Fenoglio, Frank Brockners, Hugo Latapie, Dmitry Goloubew
Wednesday, July 7th, 2021

AI 2.0 - Episode #1, Introduction
By Hugo Latapie, Ramana Kompella
Wednesday, July 7th, 2021

Data Migration from MariaDB to Redshift using AWS Data Migration Service (DMS)
By Shiv Deshmukh
Thursday, June 24th, 2021

Access S3 Data in Amazon Redshift using Redshift Spectrum
By Shiv Deshmukh
Monday, June 21st, 2021

Simplifying account-based billing through AWS organizational setup
By Sushama Shroff
Wednesday, May 26th, 2021


Collaboration with Cisco Explores Frontier of Data Technologies
By Kevin Coss
Wednesday, May 26th, 2021

Drowning in Data and Starving for Insights - Episode #1: Swimming in Sensors and Drowning in Data
By Enzo Fenoglio, Frank Brockners
Thursday, May 20th, 2021

AI Ethics: Listening to Stakeholders
By Kenneth R Fleischmann
Monday, May 17th, 2021

Introducing Media Streaming Mesh
By Giles Heron
Monday, May 3rd, 2021

Conveying Clearly and Concisely: Cisco Internship Reflection
By Maegan Jong
Monday, April 26th, 2021

Towards More Inclusive Infrastructure
By Reinhardt Quelle
Tuesday, April 13th, 2021

How We Built a Networking-Specific Natural Language Semantic Parser
By Tal Maoz
Friday, March 19th, 2021

Inside Kubernetes Network Policy
By Dominik Tornow
Tuesday, February 9th, 2021

Inside Kubernetes Networking
By Dominik Tornow
Sunday, January 17th, 2021



Understanding and Applying Container Security
By Idan Frimark
Monday, December 21st, 2020

Mitre ATT&CK framework: What is it and does it work for K8s environment?
By Ariel Shuper
Wednesday, December 2nd, 2020
