Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Model Context Protocol (MCP) - A Deep Dive

A deep technical dive into the specifics of how Model Context Protocol (MCP) works, how it relates to previous agentic systems and what the business implications are.
Blog
•Apr 21, 2025

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

What's new

PAM-Damonium IV: The Vault of Broken Promises

This final installment takes a closer look at WHY vaults alone aren't enough and what you should do about it.
Blog
•May 20, 2025

PAM-Damonium III: CSI: Session Control

Real-time session management isn't just surveillance, it's truly your last line of defense. Come explore further in part 3 of this four-part series.
Blog
•May 20, 2025

PAM-Demonium II: Long Live Remote Access

In this act, we uncover how modern PAM must handle privileged remote access.
Blog
•May 20, 2025

PAM-Demonium I: Attack of the Scripts - The Rise of Non-Human Identities

Non-human identities (NHIs) — including bots, scripts, service accounts and APIs — are taking over. Part 1 of this four-part series explores the mass chaos this is causing.
Blog
•May 20, 2025

Cyber Insights Report - May 19, 2025

The M&S cyber attack reveals a shift from data theft to operational disruption, highlighting vulnerabilities in legacy systems. This breach underscores the need for cyber resiliencee over mere defense, challenging businesses to rethink continuity strategies amid rising AI threats and regulatory pressures. Resilience, not just protection, is the new imperative.
Blog
•May 19, 2025

AI at Work: Streamlining Warehouse Operations with Automated Label Scanning

WWT piloted a custom AI-powered label scanning system to streamline warehouse receiving operations. By combining edge computing, multimodal models and real-time system integration, the solution significantly reduced manual processing time and improved accuracy. Built in-house to meet specific operational needs, the system offers a scalable, cost-effective path to modernizing warehouse workflows and enhancing overall supply chain performance.
Blog
•May 19, 2025

Managing Network Congestion in AI: The Role of Explicit Congestion Notification (ECN)

This post delves into Explicit Congestion Notification (ECN) as a tool for managing network congestion in AI and high-performance computing environments. By slowing down packet transmission, ECN enhances performance, though its implementation poses challenges, necessitating careful configuration and tuning for optimal results.
Blog
•May 14, 2025

Entitled to Nothing: How to Evaluate an IGA Solution Before it Evaluates You!

This post provides key considerations, traps to avoid and an IGA evaluation checklist that will make your compliance officer smile.
Blog
•May 14, 2025

Unlocking the Right Fit: A Practical Guide to Evaluating a Workforce Access Management Solution

In this short and strategic guide, we'll help you cut through the jargon, and get clear on what actually matters when it comes to choosing the perfect Workforce Access Management solution.
Blog
•May 12, 2025

Cyber Insights Report - May 12, 2025

A massive Oracle Cloud breach exposed 6 million records, highlighting vulnerabilities in SaaS supply chains and the urgent need for modernized SOCs. This incident challenges enterprises to rethink security strategies, emphasizing visibility, response and accountability in multi-cloud environments. How prepared is your organization for such a cyber threat?
Blog
•May 12, 2025

Agent Roster for AI Blueprint for Webpage Quality Assurance

The Quality Assurance Testing Blueprint revolutionizes QA with a multi-agent system. This page documents the specific agents and their abilities in use by the blueprint.
Blog
•May 12, 2025

Scaling Agentic AI - Impact of Model Context (MCP) and Agentic (A2A) protocols

This post outlines the development of agentic solutions, which are autonomous systems designed to respond to environmental stimuli. These systems are increasingly being utilized in various sectors such as banking, supply chain and travel, where decisions are progressively made with minimal human intervention. The focus is on two key methodologies: Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication, both of which are crucial for creating adaptable and efficient agentic systems.
Blog
•May 12, 2025

Automated Frequency Coordination (AFC) for 6 GHz Wi-Fi

This blog post traces the history of Wi-Fi technology from its humble beginnings to its current applications and discusses the regulatory and technical obstacles that hinder the full utilization of the 6 GHz spectrum
Blog
•May 9, 2025

What's the big deal with Wi-Fi 7?

Wi-Fi 7 is the next step in the evolution of Wi-Fi standards, following Wi-Fi 6 and Wi-Fi 6E. It is based on the IEEE 802.11be standard and offers faster speeds, lower latency and more efficient spectrum use.
Blog
•May 9, 2025

WPA3 – What is it and what do I need to know?

As Wi-Fi speeds continue to increase, it's essential to understand how to protect your data from eavesdroppers and malicious actors. This blog post delves into the evolution of Wi-Fi security, from the early days of WEP to the advanced protections offered by WPA3. I explore the key milestones and innovations that have shaped Wi-Fi security over the past two decades and describe how to safeguard your network in an increasingly connected world.
Blog
•May 9, 2025

Configuring Omnissa Horizon as a VDI Integration in Island Enterprise Browser

Integrating Island Enterprise Browser with Omnissa Horizon creates a secure, efficient digital workspace, enhancing remote and hybrid work. This integration helps enforce Zero Trust security, streamlines VDI access, and supports BYOD strategies for seamless, policy-driven access to corporate resources while minimizing data leakage risks and maintaining productivity.
Blog
•May 8, 2025

Unlocking Seamless Digital Workspaces: How AIOps and DEM Work Together

As IT environments continue to grow in scale and complexity, relying on manual operations just doesn't cut it anymore. Advancements in technologies like AI and ML have led to the rise of AIOps and Digital Experience Monitoring (DEM) — solutions that extend the power of IT Operations Management (ITOM) to drive deeper insights and smarter automation. Before we discuss how these two are connected, let's take a closer look at each separately.
Blog
•May 8, 2025

Commvault's New Directions and Announcements at SHIFT Event

Commvault's 'SHIFT' event unveiled a transformative approach to data protection, emphasizing continuous business resilience, AI-driven security and multicloud flexibility. Addressing cyber threats and compliance, the event highlighted the necessity of understanding business infrastructure for robust data management. Commvault's innovations promise to redefine the security landscape.
Blog
•May 7, 2025

From Robots to Personalization: Three Tech Trends Redefining the QSR Experience

Learn how AI, robotics and data are shaping the future of fast food.
Blog
•May 7, 2025

For Better or For Breach: RSA 2025's Commitment to Cyber Unity

The month of May marks the kickoff of both wedding and conference season, a time when people come together to share journeys and celebrate new beginnings. The RSA Conference 2025 exemplified this spirit, bringing together a diverse array of cybersecurity professionals, innovators and thought leaders to tackle ever-evolving threats. Drawing inspiration from the wedding adage "Something Old, Something New, Something Borrowed, Something Blue," we will explore the key themes and insights from this year's event.
Blog
•May 6, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

52 Followers

At a glance

655Total
655Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Automation
  • Software Development
  • AI Solutions
  • Cloud
  • Cybersecurity Risk & Strategy
  • Security Operations
  • Digital Workspace
  • Cisco
  • Networking
  • Primary Storage
  • Customer Experience
  • AI Security
  • Application Services
  • Network Security
  • AI Proving Ground
  • Infrastructure Automation

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies