Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Agent-2-Agent Protocol (A2A) - A Deep Dive

Explore the transformative potential of Google's Agent2Agent (A2A) protocol, enabling seamless AI agent collaboration across diverse systems. Discover how A2A's scalable, secure, and model-agnostic design can revolutionize intelligent automation, driving operational efficiency and innovation. Uncover why A2A might be the next leap in AI-driven business solutions.
Blog
•Jun 15, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

What's new

Microsoft's pricing update: How it affects you and what to do next

Learn what these changes mean for your organization and three steps you can take now to prepare.
Blog
•Aug 21, 2025

Accelerating Utility Rate Case Filings with Generative AI

Generative AI (GenAI) can revolutionize utility rate cases by automating repetitive tasks, reducing costs by up to 25%, and enhancing filing quality. As regulatory demands grow, GenAI offers a strategic advantage, transforming complex, costly processes into streamlined and efficient operations, freeing teams to focus on innovation.
Blog
•Aug 20, 2025

Fortinet Technical Architect Team at WWT

WWT's technology practice enhances its collaboration with Fortinet by integrating extensive technical knowledge, certified engineering skills, and practical solution testing within its Advanced Technology Center. Through collaborative marketing efforts, Fast Track training programs, and comprehensive lifecycle services, WWT and Fortinet assist customers in designing, deploying, and optimizing secure and scalable environments. This partnership aligns Fortinet's innovative solutions with WWT's integration expertise to deliver reliable, comprehensive cybersecurity outcomes.
Blog
•Aug 20, 2025

AI as a Strategic Lever — Moving from Pilots to Scalable Advantage

Nearly every enterprise has launched an AI pilot. But far fewer have turned those experiments into scalable, production-grade capabilities that generate measurable business value. If your AI strategy is still circling proof-of-concept, you're not alone — but you're falling behind.
Blog
•Aug 20, 2025

Navigating the Modern Virtualization & Container Landscape

The data center is evolving faster than ever. Traditional virtualization platforms remain the backbone of enterprise IT, but container technologies are reshaping how applications are developed, deployed and scaled. For most organizations, the future isn't virtualization vs. containers — it's finding the right balance between the two.
Blog
•Aug 18, 2025

Cracking M&A: How IT Creates Impact Without Always Being First at the Table.

CIOs and CISOs often seek early involvement in M&A, but success hinges on readiness, not timing. Effective leaders focus on structured planning and proven processes, enabling swift action post-deal. Emphasizing readiness over early access ensures strategic integration and risk management, transforming ambiguity into decisive leadership.
Blog
•Aug 18, 2025

The AI Security Crossroads: Black Hat and Defcon 2025 Show What's Next

Black Hat USA 2025 and Defcon 33 spotlighted AI's pivotal role in cybersecurity, shifting focus to agentic AI's dual use in defense and attack. Keynotes emphasized integrated resilience and trust, while labs and demos showcased AI-driven threats and defenses. The AI battleground is evolving rapidly, demanding adaptive strategies.
Blog
•Aug 18, 2025

Pop Quiz: How do you publish VDI applications directly on the Island Enterprise Browser landing page

Streamline user experience by integrating published apps directly on the Island Enterprise Browser home screen. This approach reduces clicks, enhances familiarity and accelerates adoption by offering a unified workspace. Discover how to configure one-click app icons using Omnissa Horizon and Citrix Virtual Apps, ensuring seamless, instant access to essential tools.
Blog
•Aug 15, 2025

Black Hat USA 2025: Key Takeaways and Emerging Trends

Insights from industry leaders on AI, identity, cloud and community
Blog
•Aug 15, 2025

Segmentation in the Data Center With Arista CloudVision

This post reviews the steps needed to define and configure data center segmentation policies using Arista's CloudVision platform alongside the results of these actions in a lab topology.
Blog
•Aug 15, 2025

Segmentation in the Data Center With Cisco Nexus Dashboard

This post reviews the steps needed to define and configure data center segmentation policies using Cisco's Nexus Dashboard platform alongside the results of these actions in a lab topology.
Blog
•Aug 14, 2025

Introducing Copilot Chat: Driving Adoption and Transforming Workplace Experience

Discover how Copilot Chat is transforming workplace experience by enhancing productivity, fostering creativity and driving innovation. 
Blog
•Aug 13, 2025

2025 Gartner Enterprise Backup Magic Quadrant Review

The enterprise backup and recovery market is rapidly evolving, with AI-driven automation and cyber resilience becoming essential. The 2025 Gartner Magic Quadrant highlights key vendor innovations, including Druva's SaaS breakthrough and Cohesity's strategic acquisition of Veritas. As security challenges grow, robust data protection strategies are crucial for business continuity. Here are WWT's thoughts about this landscape.
Blog
•Aug 13, 2025

It's the end of the PCoIP world as we know it, and Blast is fine

Omnissa is removing PCoIP support from most of Horizon suite, and customers are facing the end of the road for their zero clients. WWT has developed a proven solution with Omnissa, IGEL and LG to help customers migrate, secure and future-proof their endpoints
Blog
•Aug 13, 2025

Good for business: How Fortinet SD-WAN hits the mark for today's converged world

In this first installment of our Fortinet Secure SD-WAN series, we discuss how it transforms networking by aligning technology with business goals, enhancing performance, reducing costs and ensuring security.
Blog
•Aug 12, 2025

Independent SIMs and their Significance to the Electric Utility Industry

Independent SIMs revolutionize the electric utility industry by offering unprecedented flexibility and autonomy. These software-based SIMs empower utilities to seamlessly switch service providers, enhancing grid modernization and reducing risks. As embedded SIMs become standard, adopting independent SIMs is inevitable, promising a future of dynamic, cost-effective and resilient utility networks.
Blog
•Aug 12, 2025

Automated Rack Deployment in Transforming Data Centers

How organizations can transform data center operations from a deployment bottleneck to a strategic competitive advantage
Blog
•Aug 11, 2025

Boot a VM in 3 Seconds - Firecracker

I have been reading about simple, fast, programmatic virtual machines. First, I learned Ubuntu Multipass (full-fat but quick-to-deploy VMs) and then moved on to Firecracker. If you have ever used or written an AWS serverless function, the function runs on a short-lived VM that uses Firecracker technology.
Blog
•Aug 7, 2025

Unlocking the ROI of Enterprise Browsers: Securing the Modern Workforce

In today's digital-first world, enterprises face rising pressure to secure web access without compromising productivity or compliance. Traditional browsers, built for consumers, lack the controls and visibility needed in enterprise environments. Enter the enterprise browser—a purpose-built solution designed to meet the security, compliance and usability demands of modern organizations.
Blog
•Aug 7, 2025

OT/IoT Security - Industry Insights

Operational Technology (OT) and Internet of Things (IoT) devices are both drivers of innovation and growing attack surfaces. For critical infrastructure and OT environments, where safety, availability, integrity and compliance are paramount, the convergence of IT and OT systems introduces complex vulnerabilities. We provide a structured, evidence-backed view of the key risks, real-world impacts and strategies to safeguard critical infrastructure from OT/IoT cyber threats.
Blog
•Aug 4, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

60 Followers

At a glance

761Total
761Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Software Development
  • Cybersecurity Risk & Strategy
  • Digital Workspace
  • Cisco
  • Networking
  • Security Operations
  • Primary Storage
  • AI Proving Ground
  • AI Security
  • Network Security
  • Customer Experience
  • Application Services
  • GenAI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies