Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Model Context Protocol (MCP) - A Deep Dive

A deep technical dive into the specifics of how Model Context Protocol (MCP) works, how it relates to previous agentic systems and what the business implications are.
Blog
•Apr 21, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

Agent-2-Agent Protocol (A2A) - A Deep Dive

Explore the transformative potential of Google's Agent2Agent (A2A) protocol, enabling seamless AI agent collaboration across diverse systems. Discover how A2A's scalable, secure, and model-agnostic design can revolutionize intelligent automation, driving operational efficiency and innovation. Uncover why A2A might be the next leap in AI-driven business solutions.
Blog
•Jun 15, 2025

What's new

Vibe Coding, AI Assistants and the Evolution of Software Engineering

Vibe coding, powered by AI coding assistants, transforms software development by accelerating prototyping, democratizing access and fostering creative flow. This shift redefines who can build software and reshapes essential engineering skills and education for future technology leaders and teams.
Blog
•Jul 15, 2025

Breaking Away: Accelerating Payer Success Through Digital Transformation

This post highlights the top digital transformation priorities for payer executives in 2025, explores key technology investments and showcases how WWT partners with payers to drive innovation, operational excellence, and superior member experiences—empowering organizations to lead the healthcare race with confidence and agility.
Blog
•Jul 15, 2025

The New Digital Mandate — From Technology Follower to Market Architect

Technology leadership in the age of convergence isn't about managing IT—it's about orchestrating transformation. The executives who understand this distinction will architect the future. Those who don't will find themselves managing the past.
Blog
•Jul 15, 2025

Veriti and Check Point: Redefining Threat Exposure Management

An overview of Veriti, recently acquired by Check Point, which brings continuous threat exposure management into the security stack. Veriti provides real-time visibility across security tools, identifies misconfigurations and unmitigated threats, and recommends actionable steps to reduce attack surface risk without disrupting operations. This will cover how Veriti aligns with Check Point's prevention-first approach and how it can enhance an organization's overall security posture.
Blog
•Jul 15, 2025

Evolving Virtual Security: Comparing Check Point VSX and VSNext

Check Point VSX is a legacy virtualization platform for running multiple firewall instances on shared hardware. VSNext replaces it with a modern, modular architecture designed for automation, performance, and scalability. Unlike VSX, which relies on manual provisioning and legacy routing models, VSNext uses API-driven configuration, supports dynamic routing, and simplifies management and troubleshooting. It offers better tenant isolation, faster policy installation, and improved integration with cloud and container environments. VSNext is not backward compatible but is clearly the future of Check Point's virtual security strategy.
Blog
•Jul 15, 2025

Work Securely from Anywhere with Zero Trust

Picture working from a coffee shop, a park or your comfy couch. Your office can be anywhere now, but this flexibility makes protecting company data more challenging. That's why Zero Trust is crucial. In this blog, we'll explain what Zero Trust means, why it matters for secure remote work and share clear examples—especially for those working on the go with different devices.
Blog
•Jul 14, 2025

Still Drowning in Your Data Lake?

Dear CIOs and CTOs, Congratulations! You finally convinced the board to invest millions in your data lake, and after only a decade of work, you've successfully centralized… well… a whole lot of unstructured sludge. That single source of truth you promised? More like a single point of confusion. And now — just as you're ready to sit back and bask in the glory of your petabyte-scale swamp — along comes something called agentic frameworks, and suddenly all that centralized data you've been hoarding seems about as useful as a dial-up modem at a 5G conference. Let's talk about why it's time to reconsider your data strategy.
Blog
•Jul 14, 2025

How Windsurf Has Revolutionized My Development Workflow

Windsurf revolutionizes software development by drastically reducing development time. It can automate code reviews, enforce coding standards and offer potential enhancements to QA processes. However, human oversight remains crucial, blending AI efficiency with expert judgment for optimal results.
Blog
•Jul 14, 2025

Hack the Future: AI Meets Security

World Wide Technology's Ina Poecher and Ashley Schrage recap a hands-on WWT event where young women in tech explored real-world AI security challenges, learned about prompt injection and experienced the impact of collaborative STEM education.
Blog
•Jul 11, 2025

User Prompts vs System Prompts: Stop Just Asking AI Questions

Unlock AI's potential by mastering user and system prompts. User prompts guide AI like a brilliant intern, while system prompts define its identity. Together, they transform AI from a tool into a tailored agent, enhancing workflows and aligning with goals. Start designing AI to work seamlessly with you.
Blog
•Jul 11, 2025

Arista Partner Exchange - AI Backends

The blog post provides an overview of the annual Arista Partner Exchange in NYC, highlighting a key presentation on AI Backend Development. It delves into the complexities of building AI networks, focusing on backend infrastructure and the debate between cloud and on-premises deployment. The post emphasizes the importance of network symmetry, efficient GPU communication, and the advantages of Ethernet, while also discussing power management and the role of visibility tools like Arista's Cloud Vision in optimizing network performance.
Blog
•Jul 10, 2025

Shaping Tomorrow Together: The Power of Schneider Electric and WWT's Partnership

This blog, inspired by Cohort 5's tour of the Innovation Executive Briefing Center in St. Louis, highlights how collaborative innovation and a shared vision are empowering customers to meet the evolving challenges of today's technology landscape.
Blog
•Jul 10, 2025

How to align your Microsoft 365 investments with future business value

Is your current approach to Microsoft 365 licensing creating value or just maintaining the status quo?
Blog
•Jul 10, 2025

Keeping up with change at Microsoft as you plan for Microsoft 365

Navigating Microsoft's evolving ecosystem is crucial for maximizing business value. Regularly reviewing updates, optimizing licensing and aligning changes with business goals can transform Microsoft's rapid innovations into strategic advantages. Embrace these shifts to stay competitive, secure and efficient, avoiding overspending and underutilization.
Blog
•Jul 10, 2025

What is Network Monitoring?

How would you define "network monitoring?" Is it just about the network itself, or is it bigger than that?
Blog
•Jul 9, 2025

Zenith Live 2025 Unveils Zscaler Agentic AI: Your Digital Kingdom's New Guardians

Zenith Live 2025 unveiled Zscaler's Agentic AI, transforming cybersecurity into a proactive, intelligent defense. With AI heroes like the Rogue, Paladin, Wizard, Cleric and Bard, this strategy combines autonomous systems with human ingenuity to protect digital realms. Which role do you believe is most vital in this AI-driven defense?
Blog
•Jul 8, 2025

Wands at the Ready: Navigating Data Protection and Sovereignty

Welcome to the first installment of our three-part series on Data Sovereignty. In this post, we step into our "Magical Library" to demystify the crucial differences between Data Protection and Data Sovereignty, exploring why understanding these concepts is vital for safeguarding your organization's most sensitive information in an increasingly regulated world.
Blog
•Jul 8, 2025

An Overview of Web Content Accessibility Guidelines (WCAG) and Quick Tips.

The Web Content Accessibility Guidelines (WCAG) are essential for creating accessible websites, benefiting over 70 million U.S. adults with disabilities. This article explores WCAG's four categories: perceivable, operable, understandable and robust. The article offers practical tips to enhance web accessibility and compliance to ensure usability for all users.
Blog
•Jul 8, 2025

Pure Accelerate 2025 Recap

WWT's Storage Experts recap the Pure Accelerate '25 conference as it relates to the new announcements, hardware platforms and Enterprise Data Cloud vision.
Blog
•Jul 7, 2025

The NVIDIA–Cisco Spectrum-X Partnership: A Technical Deep Dive

NVIDIA and Cisco's Spectrum-X partnership combines best-of-breed software and hardware into a multivendor ecosystem. This partnership enhances scalability, flexibility, and vendor interoperability, addressing the critical demands of AI/ML workloads. The collaboration promises a high-performance Ethernet fabric, redefining load balancing and congestion control for the AI era.
Blog
•Jul 3, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

58 Followers

At a glance

729Total
729Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Applied AI
  • Automation
  • Cloud
  • Software Development
  • Cybersecurity Risk & Strategy
  • Cisco
  • Digital Workspace
  • Networking
  • Security Operations
  • Primary Storage
  • AI Proving Ground
  • AI Security
  • Network Security
  • Customer Experience
  • Application Services
  • GenAI

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies