Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSCyberArkGoogle CloudVMware
The ATC
Explore

Select a tab

What's popular

WWT Sets a New Standard for Enterprise-Ready AI with Cisco Secure AI Factory with NVIDIA

Discover how WWT, Cisco and NVIDIA are giving enterprises a clear, secure path to turn AI ambition into real-world impact with the Cisco Secure AI Factory with NVIDIA modular reference design, supported by proven expertise and ready-to-use resources.
Blog
•Feb 9, 2026

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

Introduction to XQL: Writing Your First Query

Learning a new programming or query language can be daunting, but if you've used the boolean options in a web search engine before, you can master XQL queries in no time. Like with web searches, we start with a hypothesis of our search, add filters to limit our results, and then validate the results that are returned against our hypothesis.
Blog
•Nov 18, 2024

What's new

SentinelOne FY27 Sales Kick Off Recap

Fresh off its sales kickoff, SentinelOne is going all in on AI security, unified attack surface protection, and the Autonomous SOC. The mid-market enterprise detection and response (EDR) narrative is outdated. This is about securing AI at scale and reshaping modern security operations.
Blog
•Feb 27, 2026

The True Cost of Observability

Balancing uptime and observability is crucial for IT leaders. While extreme availability minimizes costly downtime, it demands significant investment. Observability tools can reduce outages but may inflate costs. Decision-makers must weigh the benefits of reliability against costs, aligning investments with business value and risk tolerance to achieve optimal outcomes.
Blog
•Feb 26, 2026

Running a True Cloud Operating Model

Most organizations modernize infrastructure, but few operate like a cloud. The difference lies in observability, automation, security and operating discipline. Learn how combining these layers turns a technology platform into a true cloud operating model that delivers agility, accountability and measurable business value.
Blog
•Feb 26, 2026
A red and black push lawn mower with orange wheels actively cutting green grass, topped with a small open laptop displaying green code on a dark screen, and a small orange cube-shaped robot head with simple dot eyes and a flat mouth perched on the handle area, set against a lush green lawn with blurred trees in the background.

The Lawn Mower Metaphor: Getting Real Value from Windsurf Without Cutting the Flowers

If you're a software engineer navigating fast-turnaround proof-of-concept projects, this post explores how Windsurf's AI coding agent, Cascade, can accelerate development without breaking what already works. Using a "lawn mower" metaphor, it covers two key techniques: understanding the codebase before writing code, and executing implementation plans one deliberate step at a time.
Blog
•Feb 26, 2026

Platformizing the AI Decade with Palo Alto Networks

Palo Alto Networks' recent acquisitions signal a structural shift from portfolio integration to true platformization for the AI decade. By securing AI pipelines, embedding identity enforcement, converging observability, and governing autonomous endpoints, the platform aligns to machine-speed risk—positioning enterprises to architect resilient, future-ready security rather than react to disruption.
Blog
•Feb 24, 2026
Nokia Event Driven Automation for Network Lifecycle Management

Network Automation with Nokia and Red Hat OpenShift

Nokia's Event Driven Automation (EDA) is a cloud-native platform that leverages data center fabric automation and AI Operations to simplify the management of network layers across physical switching, hypervisors and infrastructure management. By using an intent-based approach for network lifecycle management, EDA supports multiple vendors and integrates with solutions such as Red Hat OpenShift and Netbox Labs.
Blog
•Feb 23, 2026

Why Modern Cloud WLANs Are Re-Centralizing the Data Plane

Modern cloud-managed WLANs are reintroducing centralized data-plane aggregation to improve scalability, simplify operations, and enhance roaming. Cisco's Campus Gateway exemplifies this hybrid model by combining cloud control with centralized tunneling, enabling cleaner segmentation and more efficient campus and branch network architectures at both large and small scales.
Blog
•Feb 23, 2026
Laptops with programming code

Unlocking the Power of AI Coding Assistants

AI coding assistants are transforming software development by boosting productivity, enhancing code quality and facilitating continuous learning. These tools not only automate repetitive tasks but also provide insightful guidance, enabling developers to work smarter and more creatively.
Blog
•Feb 20, 2026
LLM INFERENCE ARCHITECTURE

Building for the Result: A Guide to Inference Architecture - Part 1

This document provides a comprehensive guide to designing efficient AI inference architectures, focusing on optimizing hardware and system design for real-time model deployment rather than training. * Inference focus over training: Inference drives AI product value and requires less inter-connectivity than training, allowing cost-efficient architectures by removing unnecessary training overhead. * Guidance for cost-effective inference: Selecting suitable GPUs, optimizing models, and designing tailored data center solutions are key to achieving low cost per token and reliable inference performance.
Blog
•Feb 18, 2026

Stop Stacking Boxes. Start Designing Security.

Back-to-back firewalls were effective 15-20 years ago, but in today's encrypted, identity-driven and rapidly evolving threat landscape, they add cost and complexity without meaningful protection. Modern security replaces duplicated perimeters with platform-integrated NGFW enforcement, segmentation and coordinated prevention—delivering stronger, measurable defense through intelligent design rather than stacked legacy controls.
Blog
•Feb 17, 2026

Get Hands-On with Army GEMSS Triage Support

Discover how Army GEMSS Triage Support helps Army IT teams quickly resolve complex Cisco technology challenges before the contract year ends. Learn what triage is, how to submit a request and why now is the time to use your remaining triage weeks to strengthen your network and mission readiness.
Blog
•Feb 17, 2026

Using DEX to Mitigate Rising EUC Device Costs and Hardware Shortages in the Age of AI

In a landscape of rising costs and limited supply, IT leaders face the challenge of maintaining productivity and innovation. Digital Employee Experience (DEX) tools offer a strategic advantage, enabling data-driven decisions to extend device lifecycles, optimize hardware investments, and leverage virtualization, transforming endpoint management into a business optimization exercise.
Blog
•Feb 17, 2026
AI agents offload your low-level tasks so you can concentrate on what matters.

AI Agents are Becoming the New Digital Teammates

AI agents revolutionize work by automating repetitive tasks, freeing time for strategic, creative and human-centric activities. They integrate seamlessly into existing workflows, enhancing productivity without replacing human judgment. Embrace AI to focus on high-value tasks, amplify output and gain a competitive edge in the evolving workplace.
Blog
•Feb 16, 2026

Storage Automation with Red Hat OpenShift and NetApp

Deploying Red Hat OpenShift with NetApp Trident enables efficient storage management for stateful applications. By configuring persistent storage using local or shared options, administrators can optimize resources for AI, databases and virtual machines. This guide simplifies the setup of storage classes and volume snapshots for seamless integration and scalability.
Blog
•Feb 13, 2026

Manufacturing at the EDGE: SCADA Instrumentation, Model Context Protocol and Agentic Design Patterns

Modern manufacturing is evolving towards data-centric, automated and intelligent systems that require contextualized operational data streaming from IoT-based edge devices converging with IT networks for adaptive real-time decision-making. MCP offers a structured approach to managing and interpreting diverse data streams, while SCADA systems serve as the core industrial instrumentation integrated with agentic methods and advanced inferencing to enhance manufacturing processes.
Blog
•Feb 13, 2026

Automating Third-Party Risk with Dataminr + Cortex XSOAR

The gap between collecting threat feeds and applying real-world threat intelligence to your environment is where most programs fail. Security teams know something happened, but struggle to detect it early, determine relevance, and trigger consistent response actions. Integrating Dataminr's AI-powered real-time threat intelligence with Cortex XSOAR enables your SOC to be ahead of physical and cyber threats correlated to your environment.
Blog
•Feb 13, 2026

When Identity Becomes the Battlefield: Why Palo Alto Networks + CyberArk Changes the Map

Palo Alto Networks' acquisition of CyberArk marks a structural shift in cybersecurity, making Identity Security a core platform pillar alongside Network and SecOps. By unifying privilege, machine and AI identity protection, the move accelerates platformization and operational resilience.
Blog
•Feb 12, 2026

MWC Barcelona 2026: Embracing the Future of AI in Telecom and Enterprise

Join us for a preview of Mobile World Congress (MWC) 2026 Barcelona, including insights from WWT's AI-work in the telecom and enterprise verticals.
Blog
•Feb 12, 2026

The AI Adoption Gap Isn't Technical. It's Human.

At the Cisco AI Summit, multiple leaders pointed to a growing gap between what AI can do and how organizations are absorbing it. This gap is not because the technology isn't ready, but because organizations haven't changed how people work, collaborate and build trust around AI.
Blog
•Feb 11, 2026

Moving Healthcare from AI Pilots to Enterprise AI-at-Scale

This will be the year healthcare moves decisively from AI experimentation to scaled, governed, enterprise AI embedded across clinical and operational functions with measurable ROI and impact.
Blog
•Feb 11, 2026

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

75 Followers

At a glance

948Total
948Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Cisco
  • Digital Workspace
  • Software Development
  • Cybersecurity Risk & Strategy
  • Networking
  • Security Operations
  • AI Security
  • Network Security
  • GenAI
  • Primary Storage
  • Microsoft
  • End-User Computing
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies