Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Debunking the Myths of Cisco's Software-Defined Access (SDA)

Cisco Software-Defined Access (SDA) has evolved from a promising concept to a proven enterprise solution. Despite lingering myths, SDA is now a mature, scalable and secure architecture powering thousands of modern campus networks. In this post, we'll debunk common misconceptions and highlight real-world success stories that showcase SDA's true capabilities.
Blog
•Oct 12, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

Securing the Era of AI: How Cisco AI Defense Protects the Entire AI Lifecycle

AI's rapid adoption outpaces governance, creating unmanaged risks. Cisco's AI Defense addresses vulnerabilities in third-party tools and enterprise applications, offering automated red-teaming, runtime protection and AI supply chain management. This framework ensures the secure deployment of AI, striking a balance between innovation and accountability, and provides a blueprint for responsible AI adoption.
Blog
•Oct 31, 2025

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

What's new

Fortinet Xperts 2025

Fortinet XPERTS 2025 delivered the heat, despite the cold outside. Packed with cutting-edge innovation, expert insights and hands-on learning, this year's event proved once again that Fortinet knows how to bring the fire to cybersecurity.
Blog
•Nov 20, 2025

Securing the AI Surge with Check Point's GenAI Protect

This blog explores how GenAI has surged into daily workflows, often without visibility or guardrails, and why organizations must secure this adoption without slowing productivity. It explains the risks of shadow AI, the value of Check Point's GenAI Protect and how WWT's AI Proving Ground accelerates safe, multivendor GenAI deployment across modern enterprise environments.
Blog
•Nov 20, 2025

Software Image Management (SWIM): Fixing the IT Infrastructure Gap

Struggling with slow, manual network updates? Discover how Software Image Management (SWIM) closes the IT infrastructure gap by automating patching, boosting compliance, and eliminating configuration drift so your team can focus on innovation and your business stays competitive.
Blog
•Nov 19, 2025

Securing the Future: Fortinet as WWT's Partner of the Month

A closer look at the powerful partnership between WWT and Fortinet—and how the Associate Academy experience brings cybersecurity to life for the next generation of technologists.
Blog
•Nov 19, 2025

Accelerating Software Development Velocity with Devin

Devin is an autonomous AI engineer who acts like a trusted kitchen manager, handling the backlog, repetitive prep work and tasks that slow teams down, so human developers can focus on the highest-value engineering "dishes." Instead of just making individuals faster, Devin adds true parallel capacity by taking on delegated work from end to end. It understands codebases, completes tasks independently, and returns finished outputs, such as pull requests. In short, Devin is a new kind of teammate who helps organizations move faster and clear the work they've never had time to tackle.
Blog
•Nov 19, 2025

Cisco's Technology Announcements: Building the AI-Ready and Edge-First Future

Cisco Partner Summit 2025 in San Diego marked more than a celebration of partnerships. It represented a turning point in how Cisco and its ecosystem are defining the next era of AI, edge compute, networking and lifecycle services. The event showcased major technology announcements alongside a sweeping series of awards recognizing partner excellence. Among those honored, World Wide Technology (WWT) stood out for its innovation, customer impact and global execution.
Blog
•Nov 19, 2025

5 Key Takeaways from UBBA Summit and Plugfest 2025

The Utility Broadband Alliance's premier event provided insight into how utilities can modernize operations, take control of their data and build future-ready networks.
Blog
•Nov 19, 2025

The Open-Source Equation: Balancing Cost, Control and Complexity

Open-source virtualization and container platforms promise flexibility and freedom from licensing constraints, but they can also introduce operational overhead and risks that should be weighed carefully. This post provides a balanced view of when open-source makes sense - and when enterprise support still matters.
Blog
•Nov 18, 2025

Zero Trust Principles

Not just a single solution, a zero trust implementation is an integrated approach for continuous validation of authorized users across your entire organization. A zero trust security framework focuses on protecting critical assets through a layered, continuously monitored and adaptable architecture that minimizes risks and containment in case of breaches.
Blog
•Nov 18, 2025

We Gained More Wizdom in 2025

Wiz's inaugural user conference in NYC unveiled new expansions in AI and SaaS security, introducing agentic AI and Attack Surface Management. These innovations aim to enhance context-driven security, addressing emerging threats and prioritizing vulnerabilities. As AI and SaaS platforms evolve, Wiz's proactive approach ensures robust protection against increasingly sophisticated adversaries.
Blog
•Nov 18, 2025

6 Key Takeaways from NVIDIA GTC DC 2025

The leading AI conference highlighted how emerging technologies are moving from experimentation to real-world applications, transforming organizations across the public and private sectors.
Blog
•Nov 17, 2025

Cutting Through Security Vendor Hype: A Practical Guide

Every security vendor claims they're revolutionary. Most are full of it. After sitting through countless pitches, I've learned to spot the red flags fast – and so can you. Here's how to separate the vendors who'll actually help you win from the ones just looking to cash your check and ghost you.
Blog
•Nov 14, 2025

Part 1 - Devin: Autonomous AI for Modernization

Legacy code modernization is now a strategic imperative, driven by technical debt and innovation demands. Devin, an autonomous AI, revolutionizes this process by compressing timelines, enhancing quality and freeing engineers for innovation. Enterprises must embrace AI-orchestrated modernization to stay competitive, transforming challenges into opportunities for growth and resilience.
Blog
•Nov 13, 2025

Part 2 - Devin: Autonomous AI for Modernization

In Part 2, we shift from strategy to execution. We open the hood on Devin, the autonomous AI software engineer, and walk through its enterprise-ready workflow—from high-fidelity codebase analysis to automated refactoring, test creation, documentation and CI/CD orchestration—revealing how each step improves modernization predictability, auditability and operational scale for large organizations.
Blog
•Nov 13, 2025

Check Point's Virtual Patching and the Evolution of Application Security

This blog discusses the Log4j crisis and highlights how Check Point's AI-driven WAAP protected customers through virtual patching. It explains the shift from WAF to WAAP, highlighting fast deployment, adaptive prevention and simple evaluation, which proves that real security comes from automation and proactive protection, rather than waiting for patches.
Blog
•Nov 12, 2025

SentinelOne OneCon 2025: Redefining the Future of AI-Driven Security

SentinelOne isn't afraid to take on the hard problems. Too often, as practitioners, we are faced with having to make concessions in our security program for the sake of waiting on our OEM of choice to innovate, acquire or deliver on feature-rich promises over the years of our contract terms. If there is one thing that 2025 has taught me is that SentinelOne is facing those head-on.
Blog
•Nov 12, 2025

Why Cabinet Color Matters More Than You Think in Data Center Design

When building or expanding a data center, many important decisions must be made, and every design decision affects performance, efficiency and cost. Power density, cooling strategy and cable management are obvious factors, but one of the most overlooked elements is cabinet color.
Blog
•Nov 12, 2025

Cribl for Security: The Control Plane for AI's Data Tsunami

AI doesn't just generate insights — it generates data chaos. Cribl brings control back to the pipeline with selective capture, policy-first governance and search-in-place, turning AI exhaust into operational advantage.
Blog
•Nov 11, 2025

Powering AI at Scale: Cisco UCS C880A M8

Cisco and World Wide Technology unveil the UCS C880A M8, an air-cooled, 8-way GPU server designed for large-scale AI workloads. This innovation enhances Cisco's AI infrastructure, offering exceptional GPU density, high-speed interconnects, and architectural flexibility. It represents a strategic evolution in secure, scalable, and automated AI operations, bridging current needs with future hybrid cooling solutions.
Blog
•Nov 10, 2025

The Role of AI in Email Security

Email collaboration replaced in-person meetings as the top tool of business long ago. Not much changed until AI rolled around, offering users the ability to craft more concise messages and summarize long rambling emails. But AI, like any tool, can be used for good or evil.
Blog
•Nov 10, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

68 Followers

At a glance

875Total
875Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Digital Workspace
  • Software Development
  • Cisco
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Proving Ground
  • AI Security
  • Primary Storage
  • GenAI
  • Network Security
  • Customer Experience
  • Application Services

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies