Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

When Identity Becomes the Battlefield: Why Palo Alto Networks + CyberArk Changes the Map

Palo Alto Networks' acquisition of CyberArk marks a structural shift in cybersecurity, making Identity Security a core platform pillar alongside Network and SecOps. By unifying privilege, machine and AI identity protection, the move accelerates platformization and operational resilience.
Blog
•Feb 12, 2026

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

What's new

From Hype to Action: What ViVE 2026 Revealed About Where We Stand

At ViVE 2026, healthcare leaders prioritized scalable AI, cyber resilience, interoperability and workforce relief—favoring practical, governed transformation over hype amid mounting financial and regulatory pressure.
Blog
•Mar 9, 2026

Get Ahead With Cisco's New Special Release Learning Paths & Comply to Connect

Discover Cisco's new Special Release Learning Paths designed to help engineers build in-demand skills in network automation, data center automation, security, and professional communication. This update also highlights enhancements to the Comply-to-Connect (C2C) training program, supporting DoD Zero Trust initiatives with improved reporting, updated labs, and expanded guidance for implementing Cisco ISE and endpoint visibility.
Blog
•Mar 9, 2026

Designing Red Hat OpenShift with Hosted Control Planes

Red Hat OpenShift's Hosted Control Planes (HCP) revolutionize cluster management by reducing server costs and enabling efficient, scalable deployments. With advanced features like autoscaling and multi-cluster management, HCP offers a streamlined approach to managing clusters both on-premise and in the cloud, transforming the OpenShift experience.
Blog
•Mar 6, 2026

Using AI-Powered Digital Humans for More Efficient Care

At the ViVE 2026 conference in Los Angeles, WWT demonstrated an AI-powered digital human to showcase how healthcare entities can optimize vaccine schedule referencing.
Blog
•Mar 5, 2026

NERC CIP-015 Compliance: A "How To" Guide for Power Utilities

NERC CIP-015-1, which focuses on Internal Network Security Monitoring (INSM) for bulk electric systems, became effective on September 2, 2025. Full compliance for covered entities follows a phased approach, with requirements taking effect on a staggered schedule, beginning with some control centers by that date.
Blog
•Mar 5, 2026

Meet Your New Colleague: What OpenClaw Taught Me About the Agentic Future

OpenClaw's launch marks a pivotal shift in AI, showcasing agentic systems that act autonomously, transforming workflows. This open-source experiment accelerates AI development, urging organizations to prepare for agentic AI's integration. As AI evolves, the question isn't if it will arrive, but if you're ready for its transformative potential.
Blog
•Mar 4, 2026

WWT and NetApp for Cyber Resilience - Secure Solutions for the Enterprise

In a world of evolving cyber threats, traditional disaster recovery is obsolete. NetApp and WWT together integrate security at the storage layer. Anticipate, withstand, recover and adapt to threats, transforming resilience into a strategic business advantage. Act now to protect your brand and revenue.
Blog
•Mar 4, 2026

Quantum Definitions for the Common Good: The First List

Think of this as a compendium (part 1) on what the heck quantum "is." This is a slightly well-organized, super-condensed treasure chest holding all the descriptions of the language used in this branch of science/technology/computing. It's the ultimate, curated cheat sheet designed to make you feel like an expert without reading a thousand boring pages.
Blog
•Mar 2, 2026

One Vision, Any Fabric: Cisco Hyperfabric Announcements from Cisco Live Amsterdam 2026

At Cisco Live Amsterdam 2026, Cisco Hyperfabric redefined data center networking, evolving into a versatile, cloud-managed solution. Key announcements included its integration with Nexus 9300 switches, EU management portal expansion and multi-site capabilities. Hyperfabric empowers organizations to architect distributed resource pools, enhancing scalability, interoperability, and operational efficiency in modern networks.
Blog
•Mar 2, 2026

The Journey of Cortex XSOAR Playbook: Designing Your First Playbook

Transform your manual firewall upgrade process into a streamlined, automated workflow with Cortex XSOAR. This article guides you through designing a robust playbook for upgrading High Availability firewall pairs, emphasizing architectural decisions, governance integration and validation patterns. Discover how automation reduces errors, enhances efficiency and satisfies compliance requirements.
Blog
•Mar 2, 2026

SentinelOne FY27 Sales Kick Off Recap

Fresh off its sales kickoff, SentinelOne is going all in on AI security, unified attack surface protection, and the Autonomous SOC. The mid-market enterprise detection and response (EDR) narrative is outdated. This is about securing AI at scale and reshaping modern security operations.
Blog
•Feb 27, 2026

The Wi-Fi Revolution You Haven't Heard About Yet

Wi-Fi 7's most overlooked feature — Enhanced Broadcast Services (EBCS) — has the potential to fundamentally reshape how public spaces, emergency services and businesses communicate with people in real time. From stadium experiences and airport wayfinding to life-safety alerts in cellular dead zones, EBCS turns existing Wi-Fi 7 infrastructure into a powerful one-to-many broadcast platform with real benefits for end users and operators alike. This post breaks down how EBCS works, how it's secured and why it represents a genuinely new category of wireless communication: one that lets access points push authenticated, encrypted content to any compatible device in range without requiring a network connection.
Blog
•Feb 26, 2026

Storage for Inference (Part 2 of Inference Architecture)

Inference succeeds or fails on tail latency. You can have plenty of GPU power and still miss service-level objectives when storage spikes, replicas scale at the same time or shared systems get noisy. This article lays out the storage behavior observed in real inference services, a reference storage stack that maintains stable P95 and P99 latencies under bursty traffic, and recommendations when pushing inference to the edge.
Blog
•Feb 26, 2026

The True Cost of Observability

Balancing uptime and observability is crucial for IT leaders. While extreme availability minimizes costly downtime, it demands significant investment. Observability tools can reduce outages but may inflate costs. Decision-makers must weigh the benefits of reliability against costs, aligning investments with business value and risk tolerance to achieve optimal outcomes.
Blog
•Feb 26, 2026

Running a True Cloud Operating Model

Most organizations modernize infrastructure, but few operate like a cloud. The difference lies in observability, automation, security and operating discipline. Learn how combining these layers turns a technology platform into a true cloud operating model that delivers agility, accountability and measurable business value.
Blog
•Feb 26, 2026
A red and black push lawn mower with orange wheels actively cutting green grass, topped with a small open laptop displaying green code on a dark screen, and a small orange cube-shaped robot head with simple dot eyes and a flat mouth perched on the handle area, set against a lush green lawn with blurred trees in the background.

The Lawn Mower Metaphor: Getting Real Value from Windsurf Without Cutting the Flowers

If you're a software engineer navigating fast-turnaround proof-of-concept projects, this post explores how Windsurf's AI coding agent, Cascade, can accelerate development without breaking what already works. Using a "lawn mower" metaphor, it covers two key techniques: understanding the codebase before writing code, and executing implementation plans one deliberate step at a time.
Blog
•Feb 26, 2026

Platformizing the AI Decade with Palo Alto Networks

Palo Alto Networks' recent acquisitions signal a structural shift from portfolio integration to true platformization for the AI decade. By securing AI pipelines, embedding identity enforcement, converging observability, and governing autonomous endpoints, the platform aligns to machine-speed risk—positioning enterprises to architect resilient, future-ready security rather than react to disruption.
Blog
•Feb 24, 2026
Nokia Event Driven Automation for Network Lifecycle Management

Network Automation with Nokia and Red Hat OpenShift

Nokia's Event Driven Automation (EDA) is a cloud-native platform that leverages data center fabric automation and AI Operations to simplify the management of network layers across physical switching, hypervisors and infrastructure management. By using an intent-based approach for network lifecycle management, EDA supports multiple vendors and integrates with solutions such as Red Hat OpenShift and Netbox Labs.
Blog
•Feb 23, 2026

Why Modern Cloud WLANs Are Re-Centralizing the Data Plane

Modern cloud-managed WLANs are reintroducing centralized data-plane aggregation to improve scalability, simplify operations, and enhance roaming. Cisco's Campus Gateway exemplifies this hybrid model by combining cloud control with centralized tunneling, enabling cleaner segmentation and more efficient campus and branch network architectures at both large and small scales.
Blog
•Feb 23, 2026
Laptops with programming code

Unlocking the Power of AI Coding Assistants

AI coding assistants are transforming software development by boosting productivity, enhancing code quality and facilitating continuous learning. These tools not only automate repetitive tasks but also provide insightful guidance, enabling developers to work smarter and more creatively.
Blog
•Feb 20, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

76 Followers

At a glance

960Total
960Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Software Development
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Security
  • Network Security
  • Primary Storage
  • GenAI
  • Microsoft
  • End-User Computing
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies