Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Model Context Protocol (MCP) - A Deep Dive

A deep technical dive into the specifics of how Model Context Protocol (MCP) works, how it relates to previous agentic systems and what the business implications are.
Blog
•Apr 21, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Agent-2-Agent Protocol (A2A) - A Deep Dive

Explore the transformative potential of Google's Agent2Agent (A2A) protocol, enabling seamless AI agent collaboration across diverse systems. Discover how A2A's scalable, secure, and model-agnostic design can revolutionize intelligent automation, driving operational efficiency and innovation. Uncover why A2A might be the next leap in AI-driven business solutions.
Blog
•Jun 15, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

What's new

Incident Management or Incident Mismanagement? How to Stop Embarrassing Yourself in a Crisis

Ah, network incident management — that magical time when your team gets to showcase just how fragile your "resilient" infrastructure really is. The tickets pile up, Slack melts down, and your inbox becomes a crime scene. You've invested millions in "state-of-the-art" monitoring and yet… somehow you're still finding out about outages from angry customers on Twitter. Let's be honest: managing network incidents is painful. But it doesn't have to be. Let's take a walk through the most common pain points that plague your operations teams — and the mitigations that might actually let you sleep at night.
Blog
•Jul 29, 2025

From Alerts to Action: Quantifying Cloud Risk with Wiz & WWT

Integrating Wiz CSPM issues for financially quantified risk insights
Blog
•Jul 24, 2025

Windsurf In Action: Building AWS Infrastructure

Our team has been using Windsurf as an AI-powered development environment for a few months now. Like any tool, there are areas where it shines. Here's an experience that demonstrates the tool at its best, turning a multi-day feature into a single day's work.
Blog
•Jul 23, 2025

Disaggregated Storage – the Latest AI Trend

Disaggregated storage solutions allow storage compute nodes to scale independently from capacity nodes. This innovative approach enhances flexibility and performance, overcoming the limitations of traditional storage methods.
Blog
•Jul 23, 2025

The AI Illusion: What's Really Happening Behind the Curtain

This Tech Trends article cuts through the hype to explain what AI is and isn't. Backed by data, it breaks down the difference between narrow AI and AGI, and highlights how today's AI delivers value through summarization and support, not reasoning or awareness.
Blog
•Jul 21, 2025

Navigating the Rapids: Insights on How WWT Drives Healthcare Innovation

The rapidly evolving landscape of healthcare and life sciences presents both unprecedented opportunities and challenges. This article shares key insights on how WWT is uniquely positioned to help healthcare organizations stay ahead of these challenges through innovative solutions and strategic partnerships.
Blog
•Jul 21, 2025

A study in flexible innovation, and forming a new partnership based on trust.

The Filigran partnership enables our teams to provide new ways to enable a more holistic advanced persistent threat (APT) search and remediation methodology based on the combination of breach and attack simulation functions, while taking advantage of native integrations coupled with industry-standard, widely deployed agent technologies.
Blog
•Jul 17, 2025

Walk This Way - The future of the digital workplace is here, and we're walking it with you

Welcome to "Walk This Way." Today is the first step to a better EUC experience with WWT and Omnissa.
Blog
•Jul 17, 2025

Bringing Zero Trust to Life With Microsoft

Zero Trust is not a product, but a strategic approach to security. Still, viewing these principles through a vendor's solutions — like Microsoft's — makes them much easier to apply. Microsoft's tools map directly to the seven core pillars of modern Zero Trust. Here's how each pillar is addressed with Microsoft technologies that help bring each concept to life.
Blog
•Jul 16, 2025

Vibe Coding, AI Assistants and the Evolution of Software Engineering

Vibe coding, powered by AI coding assistants, transforms software development by accelerating prototyping, democratizing access and fostering creative flow. This shift redefines who can build software and reshapes essential engineering skills and education for future technology leaders and teams.
Blog
•Jul 15, 2025

Breaking Away: Accelerating Payer Success Through Digital Transformation

This post highlights the top digital transformation priorities for payer executives in 2025, explores key technology investments and showcases how WWT partners with payers to drive innovation, operational excellence, and superior member experiences—empowering organizations to lead the healthcare race with confidence and agility.
Blog
•Jul 15, 2025

The New Digital Mandate — From Technology Follower to Market Architect

Technology leadership in the age of convergence isn't about managing IT—it's about orchestrating transformation. The executives who understand this distinction will architect the future. Those who don't will find themselves managing the past.
Blog
•Jul 15, 2025

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Evolving Virtual Security: Comparing Check Point VSX and VSNext

Check Point VSX is a legacy virtualization platform for running multiple firewall instances on shared hardware. VSNext replaces it with a modern, modular architecture designed for automation, performance, and scalability. Unlike VSX, which relies on manual provisioning and legacy routing models, VSNext uses API-driven configuration, supports dynamic routing, and simplifies management and troubleshooting. It offers better tenant isolation, faster policy installation, and improved integration with cloud and container environments. VSNext is not backward compatible but is clearly the future of Check Point's virtual security strategy.
Blog
•Jul 15, 2025

Work Securely from Anywhere with Zero Trust

Picture working from a coffee shop, a park or your comfy couch. Your office can be anywhere now, but this flexibility makes protecting company data more challenging. That's why Zero Trust is crucial. In this blog, we'll explain what Zero Trust means, why it matters for secure remote work and share clear examples—especially for those working on the go with different devices.
Blog
•Jul 14, 2025

Still Drowning in Your Data Lake?

Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge. That single source of truth you promised? More like a single point of confusion. And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference. Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025

How Windsurf Has Revolutionized My Development Workflow

Windsurf revolutionizes software development by drastically reducing development time. It can automate code reviews, enforce coding standards and offer potential enhancements to QA processes. However, human oversight remains crucial, blending AI efficiency with expert judgment for optimal results.
Blog
•Jul 14, 2025

Hack the Future: AI Meets Security

World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025

User Prompts vs System Prompts: Stop Just Asking AI Questions

Unlock AI's potential by mastering user and system prompts. User prompts guide AI like a brilliant intern, while system prompts define its identity. Together, they transform AI from a tool into a tailored agent, enhancing workflows and aligning with goals. Start designing AI to work seamlessly with you.
Blog
•Jul 11, 2025

Circularity in the IT Industry

This article discusses IT hardware circularity, emphasizing its importance in reducing waste and environmental impact. Circularity involves reusing resources to extend product lifecycles, conserve ecosystems and lower costs. Leading tech companies like NetApp, Juniper and Dell are adopting circular practices, such as modular designs and recycling programs, to enhance sustainability and reduce e-waste.
Blog
•Jul 11, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

58 Followers

At a glance

736Total
736Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Software Development
  • Cybersecurity Risk & Strategy
  • Cisco
  • Digital Workspace
  • Networking
  • Security Operations
  • Primary Storage
  • AI Proving Ground
  • AI Security
  • Network Security
  • Customer Experience
  • Application Services
  • GenAI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies