Cloud Computing

UAE to strengthen cybersecurity with new policies

The UAE hopes to introduce three new policies to enhance the country’s existing cybersecurity framework.According to the Emirates News Agency, the proposed policies...

The best new features in C# 13

char esc="e"; Implicit index access With C# 13, the implicit “from the end” index operator ^ can now be used in object initializers. You can...

Amazon countersues Nokia in escalating cloud patent battle

E-commerce and cloud computing giant, Amazon, has filed a sweeping patent infringement lawsuit against Nokia, alleging the Finnish telecoms company has misappropriated Amazon’s cloud computing...

How Dapr improves cloud-native development

Using a daemonset, a Dapr pod runs alongside your workloads. Each time the Kubernetes scheduler deploys a new instance of your application, it’ll...

An In-Depth Look at the Cisco CCDE-AI Infrastructure Certification

Since OpenAI’s mic-drop moment at the end of last year, it seems that AI—and generative AI in particular—is suddenly everywhere. For network engineers,...

Unlocking the Future of MSSP Operations with Cisco CDO APIs

In today’s hyper-connected world, businesses are perpetually exposed to digital threats. Managed Security Service Providers (MSSPs) play a pivotal role in safeguarding organizations...

Protect Against Adversary-in-the-Middle with Cisco’s User Protection Suite

In the blog, Understanding & Defending Against Adversary-in-the-Middle (AiTM) Attacks, we reviewed the basics of an AiTM attack and how Duo can protect...

The Transformational Opportunity of AI on ICT Jobs

AI represents a never-before-seen opportunity for technology to benefit humankind in every way. It’s changing everything – especially the way we work. Preparing...

Why Apache Iceberg is on fire right now

While Iceberg solves this problem, open standards are needed in other areas as well. We’re now seeing a new battlefield emerging in the...

Latest articles