Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Model Context Protocol (MCP) - A Deep Dive

A deep technical dive into the specifics of how Model Context Protocol (MCP) works, how it relates to previous agentic systems and what the business implications are.
Blog
•Apr 21, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

What's new

Bridging AI and Cybersecurity: What Check Point MCP Servers Mean for Enterprise Security

Check Point's new MCP Server enables secure, structured integration between AI tools and Check Point's security infrastructure by exposing firewall policies, objects, and logs through a standardized Model Context Protocol interface. This allows large language models like Claude or GPT to query security environments using natural language, dramatically accelerating tasks such as policy analysis, compliance checks, and incident enrichment without requiring scripts or direct API calls. Deployed on-premises for full control and visibility, the MCP Server empowers security teams to automate workflows while maintaining strong governance and auditability.
Blog
•Jul 1, 2025

A Career I Didn't See Coming. A Life I'm Proud to Live

From uncertainty to empowerment, this journey chronicles a single mother's transformative career at WWT. Initially seeking a job, she found purpose, growth and leadership. Embracing challenges, she now inspires others, embodying resilience and hope. Her story is a testament to the power of redirection and self-belief.
Blog
•Jul 1, 2025

Making Artificial Intelligence Work at WWT

How an internal IT AI Center of Excellence is driving smart, scalable solutions across the business.
Blog
•Jun 30, 2025

Do GPUs Like to Crochet?

Explore the intricate parallels between GPU architecture and crochet, unraveling how GPUs execute opcodes, manage threads and optimize parallelism. Discover the synergy of Python and frameworks like PyTorch in orchestrating GPU tasks, transforming GPUs into modern looms weaving data with precision and speed.
Blog
•Jun 30, 2025

The Human Equation: Transforming Your Workforce for the Digital Age

Struggling to turn your team into digital natives without losing their expertise? This refreshingly honest guide reveals why traditional upskilling fails and shares proven strategies like "Digital Natives as Mentors" and "Failure Labs." Discover how smart companies transform roles rather than replace people, building on existing strengths.
Blog
•Jun 28, 2025

A CTO'S Primer on Q-Day: Part 5 - How Q-Day Threatens The Mid-Market

Quantum computing is rapidly approaching, and mid-market businesses are especially vulnerable. Without early preparation, encrypted data may be exposed, leading to breaches, financial loss and reputational damage. By adopting quantum-resistant encryption and assessing vulnerabilities now, businesses can stay secure, build trust and lead in a future where quantum readiness becomes a competitive advantage.
Blog
•Jun 27, 2025

How the Prisma Access Browser Trivializes Decryption

Anyone who works with TLS decryption will probably tell you it's hard to do and never truly finished. New support tickets about websites or applications that don't work as expected are constantly coming in, requiring continual tuning of TLS decryption settings. The Prisma Access Browser can significantly reduce the complexity and increase the effectiveness of the overall solution. Let's talk about how it does this.
Blog
•Jun 26, 2025

Agents vs Agentic Workflows: Choosing the Right Paradigm for AI Systems

This post explores the key differences between AI agents and agentic workflows, outlining when to use each and how they can work together. It provides practical guidance for designing intelligent systems that balance autonomy with control, helping teams build scalable, reliable AI architectures.
Blog
•Jun 25, 2025

The Versatile Data Center Smart Switch: Cisco N9300

The Cisco Nexus N9300 Smart Switch revolutionizes data center infrastructure with its convergence of high-performance switching, network security and application services. Featuring Cisco Silicon One ASICs and a Data Processing Unit, it offers intelligent, service-aware capabilities. Optional Hypershield enhances zero-trust security, making it ideal for AI, hybrid cloud and security-conscious environments.
Blog
•Jun 25, 2025

The AI Scaling Paradox: It's Not The Tech. It's The Operating Model.

AI's transformative potential in retail is hindered by outdated IT strategies and organizational resistance. While AI demands adaptive governance and cultural change, many initiatives stall due to fragmented data, leadership misalignment and unclear ROI. Success requires strategic coordination, robust infrastructure and a shift from pilot projects to core business integration.
Blog
•Jun 25, 2025

Practical Zero Trust Security with Fortinet Universal ZTNA

Fortinet Universal ZTNA delivers practical Zero Trust security through continuous, context-aware access control, endpoint verification and centralized analytics enabling organizations to protect users and applications across hybrid environments.
Blog
•Jun 24, 2025

A CTO'S Primer on Q-Day: Part 4 - The Impact on Global Enterprises

Q-Day, the impending quantum computing breakthrough, threatens to render current encryption obsolete, exposing sensitive data across industries. As cyber criminals prepare to exploit this, organizations must urgently adopt quantum-resistant measures. The race against time is on. Proactive adaptation is crucial to safeguard digital security and ensure resilience in a post-quantum world.
Blog
•Jun 24, 2025

A CTO'S Primer on Q-Day: Part 3 - Building the Business Case for PQC

Quantum computing threatens current encryption, urging immediate action. Post-quantum cryptography (PQC) is essential for safeguarding data and maintaining trust. CTOs and CISOs must lead strategic transitions, aligning with regulatory timelines and leveraging external pressures. Early adoption ensures market leadership and resilience, transforming PQC from a technical task to a business-critical investment.
Blog
•Jun 24, 2025

A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem

Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•Jun 24, 2025

Omnissa Horizon 8 on Nutanix AHV: A modern VDI solution for the enterprise

Blog
•Jun 22, 2025

Why AI Adoption is Essential for Attracting and Retaining Today's Workforce

Embracing AI is a strategic imperative for corporate leaders to attract and retain top talent. By showcasing AI adoption, organizations signal innovation, enhance candidate experiences, promote diversity and align with strategic goals. This fosters a future-ready workforce, strengthens employer branding and ensures competitiveness in the evolving landscape of work.
Blog
•Jun 22, 2025

AWS Summit DC 2025: Cloud, AI and the Building Blocks of Public Sector Transformation

The 2025 AWS Public Sector Summit in Washington, DC, brought together leaders from government, education and nonprofits to talk about how cloud and AI are reshaping how agencies serve the public. The time for asking if the government should adopt the cloud is over. Now the focus is on how to use the cloud to leave a lasting impact. For World Wide Technology, this event was a powerful reminder of our role in helping public sector teams make the most of the cloud.
Blog
•Jun 20, 2025

AI Flavors…

We're continually bombarded with various types, flavors and descriptors of what AI is (and isn't). Therefore, to make things a little simpler (and to follow up on the on-stage descriptions I gave of the AI variants), this is a short description of what three of the main AI options would do with (and for) you if you'd ask…
Blog
•Jun 20, 2025

Cisco Live 2025: Data Center Networking Innovation Key Takeaways

At Cisco Live 2025, Cisco unveiled a bold vision for the future of data center networking—one that embraces AI scalability, embedded security and cloud-operational simplicity. From game-changing switch architectures to hyper-intelligent security tools, Cisco's announcements focused on building the AI-native, zero-trust and observability-rich data center of tomorrow. Here are five of the most impactful innovations announced.
Blog
•Jun 19, 2025

Strengthening Operational Resilience Through Effective Prioritization and Recovery Strategies

Financial institutions face an operational resilience crisis due to cyber threats and regulatory demands. WWT offers a framework for prioritizing applications, recovery strategies and insights and integrating cyber threats with operational resilience, guided by global and Canadian regulations.
Blog
•Jun 19, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

57 Followers

At a glance

709Total
709Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Software Development
  • Cybersecurity Risk & Strategy
  • Cisco
  • Digital Workspace
  • Networking
  • Security Operations
  • Primary Storage
  • AI Proving Ground
  • AI Security
  • Network Security
  • Customer Experience
  • Application Services
  • Cloud Security

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies