Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

External Dynamic Lists (EDLs) in Palo Alto Firewalls dynamically integrate IPs, URLs, and domains into security policies, reducing change requests. They empower SOCs to manage threats without firewall changes. Despite limitations, EDLs enhance security by automating updates and supporting authentication. Implementing EDLs optimizes security posture and streamlines threat management.
Blog
•Oct 10, 2023

Designing Red Hat OpenShift with Hosted Control Planes

Red Hat OpenShift's Hosted Control Planes (HCP) revolutionize cluster management by reducing server costs and enabling efficient, scalable deployments. With advanced features like autoscaling and multi-cluster management, HCP offers a streamlined approach to managing clusters both on-premise and in the cloud, transforming the OpenShift experience.
Blog
•Mar 6, 2026

What's new

Garbage In, Garbage Amplified: The AI Feedback Loop Most Companies Miss

Most teams are using AI to summarize and connect internal data. Fewer realize they may be creating a feedback loop in the process. When AI-generated content gets stored alongside source material, it can quietly shift what is treated as truth. This blog article breaks down how it happens, why it matters, and one simple structural change that can prevent it.
Blog
•Apr 7, 2026

From Observer to Catalyst: How Faculty Learned to Teach with AI in Four Sessions

Over four sessions in March 2026, WWT and GitHub took a cohort of educators from complete beginners to running fully automated classrooms — distributing assignments, collecting submissions, and setting up autograding from scratch. No coding background required. Participants left with a working GitHub Classroom, a reusable curriculum hub, and a question that had shifted from what is this? to what do I build next?
Blog
•Apr 7, 2026

Elevate Your Branch & Campus Networking Lifecycle Management

Today's networking and security trends are driving branches and campuses to rethink their network lifecycle management strategy.
Blog
•Apr 6, 2026

Check Point is building AI Security into the center of the Cyber Strategy

Check Point's cybersecurity strategy focuses on four pillars: Hybrid Mesh Network Security, Workspace Security, Exposure Management, and AI Security. As AI becomes integral to decision-making, Check Point emphasizes AI Security to address unique risks. Their AI Defense Plane ensures comprehensive governance, visibility, and continuous testing, redefining enterprise defense in the agentic AI era.
Blog
•Apr 3, 2026

Cisco Ultra-Reliable Wireless Backhaul (CURWB)

Wireless connectivity has long been too unreliable for mission-critical industrial operations. Until now. Cisco's Ultra-Reliable Wireless Backhaul (URWB) technology delivers the consistency and predictability of a physical cable, without the cable. From smart factories and autonomous vehicles to high-speed rail and busy seaports, discover how URWB is enabling industries to embrace wireless connectivity without compromising on performance or safety.
Blog
•Apr 1, 2026

AI, Experience and the Human at the Center

The Gartner Digital Workplace Summit emphasized the centrality of employees in AI-driven workplaces. Success hinges on designing AI to enhance human workflows, not overshadow them. Organizations must prioritize personalized, DEX-focused strategies, ensuring technology aligns with human needs to drive innovation and productivity.
Blog
•Apr 1, 2026

Cisco Secure Access is a Natural Evolution of Cisco Umbrella

In a rapidly evolving digital landscape, traditional security measures fall short. Cisco Secure Access, a cloud-delivered SSE solution, integrates zero trust, AI-driven threat intelligence, and defense-in-depth protection. It simplifies security operations, enhances user experience, and adapts to modern threats, ensuring seamless, secure access across diverse environments.
Blog
•Apr 1, 2026

Memory Tiering in VMware Cloud Foundation 9: A Closer Look at the TCO Equation

VCF 9's native memory tiering capability fundamentally changes how virtual infrastructure is sized and priced. For organizations running large-scale virtualized environments, understanding this feature — and its relationship to today's DDR5 vs. NVMe pricing gap — may reshape how you think about platform economics entirely.
Blog
•Mar 30, 2026

Why Networking Must Evolve Now: 3 Key Takeaways from HPE Tech Jam 2026

At HPE Tech Jam 2026, networking emerged as mission-critical infrastructure powering AI, hybrid cloud and digital operations. As Praveen Jain highlighted, rising complexity and scale demand automation and intent-based networking. Platforms like Juniper Apstra enable resilient, AI-ready data center networks—giving modern enterprises a critical competitive edge.
Blog
•Mar 30, 2026

Intent-Based Networking Is No Longer Optional: Why Juniper Apstra Is Winning in the Modern Data Center

Intent-based networking is no longer a future vision—it's a present-day necessity. As data centers evolve to support hybrid cloud, AI workloads, and multi-vendor complexity, legacy, configuration-driven models are breaking down. Forward-looking organizations are turning to intent-based networking to regain control, accelerate operations, and reduce risk—with Juniper Apstra leading the way as a proven platform for modern data center transformation.
Blog
•Mar 30, 2026

The Cloud Identity Crisis

In 2025, attackers shifted focus to credential harvesting and identity-based attacks, exploiting the surge in non-human identities (NHIs) in cloud environments. As NHIs outnumber human identities, organizations face increased risks. Effective identity governance, including Just-in-Time access and automation, is crucial for robust cloud security and minimizing operational exposure.
Blog
•Mar 27, 2026

Two Paths to a Cloud Operating Model: Top-Down or Bottom-Up

There are only two ways to become a true cloud operator: executive mandate or technical evolution. This piece examines both paths, their risks and why lasting success requires convergence between leadership vision and IT execution.
Blog
•Mar 27, 2026

Key Takeaways from the Optical Fiber Communications 2026 Conference

Members of WWT's Core Networking Team share their key takeaways and insights from the Optical Fiber Communications Conference 2026.
Blog
•Mar 27, 2026

The Invisible Network: Why Global-Fi Architecture Is the Enterprise Differentiator of 2026

In 2026, Global-Fi Architecture emerges as a crucial enterprise differentiator, transforming networks into seamless, invisible platforms. Emphasizing wireless-first design, SD-WAN integration, micro-segmentation and AIOps, it redefines business operations. Organizations investing in this architecture gain a competitive advantage, ensuring networks are reliable, secure and unobtrusive, aligning with evolving business needs.
Blog
•Mar 27, 2026

How the "Stryker" Intune Wipe Incident Highlights a Critical Gap in Endpoint Control

The "Stryker" incident highlights vulnerabilities in control plane design, leading to large-scale device wipes via Microsoft Intune. This case study emphasizes the need for layered safeguards, such as Workspace ONE's verification, segmentation and bulk action constraints, to prevent catastrophic outcomes. Architectural resilience, not just policy, is crucial for security.
Blog
•Mar 26, 2026

AI Infrastructure Is Changing—and the Network Is Now Part of the Performance Engine

AI infrastructure is shifting from disconnected components to integrated systems where compute, storage, software, and networking are optimized together for scalable performance. As AI moves into production, the data center network becomes a critical driver of efficiency, directly impacting GPU utilization, latency, and overall workload performance. Modern AI environments demand high east-west traffic handling, strong observability, resiliency and automation. For enterprises, networking is no longer just connectivity—it is foundational to delivering predictable AI outcomes, improving operational simplicity and maximizing the value of AI investments.
Blog
•Mar 26, 2026

Securing the Browser: A Closer Look at Check Point Browse

Check Point Browse revolutionizes browser security by embedding protection directly within the browser, addressing phishing, malware, credential misuse and AI-driven data leaks. Its nano agent and extension model ensure seamless, real-time defense without relying on traditional proxies, aligning security with modern work habits and safeguarding sensitive data effortlessly.
Blog
•Mar 26, 2026

WWT's Take on Fortinet Accelerate 2026

WWT's and Fortinet's partnership was showcased during Accelerate 2026.
Blog
•Mar 26, 2026

From API Discovery to Defense: Get continuous protection with F5 WAAP

APIs are the hidden engines of our connected world. Your banking app, your rideshare, even the weather app you check before stepping outside—all rely on APIs to deliver data in real time. From the essential to the mundane, we interact with them countless times a day.
Blog
•Mar 26, 2026

Agents in Action: Building the Future of AI at NSBE 2026

More than 200 engineers built a working AI agent—live, no code required—and left asking for more.
Blog
•Mar 24, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

79 Followers

At a glance

998Total
998Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Networking
  • Cybersecurity Risk & Strategy
  • Software Development
  • Security Operations
  • AI Security
  • Network Security
  • Primary Storage
  • GenAI
  • Microsoft
  • End-User Computing
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies