Skip to content
WWT LogoWWT Logo Text
The ATC
Search...
Ctrl K
Top page results
See all search results
Featured Solutions
What's trending
Help Center
Log In
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Featured today
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Featured learning path
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
WWT in the news
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
Partner spotlight
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalSustainabilityImplementation ServicesLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWS
The ATC
Explore

Select a tab

What's popular

Model Context Protocol (MCP) - A Deep Dive

A deep technical dive into the specifics of how Model Context Protocol (MCP) works, how it relates to previous agentic systems and what the business implications are.
Blog
•Apr 21, 2025

The Battle of AI Networking: Ethernet vs InfiniBand

This article is not an exploration of who does Ethernet better so much as a direct examination of technology itself. Numbers will be reported as an aggregate means between major players in the AI Networking market and contrasted with equivalent InfiniBand performance. The goal is to answer, at an atomic level, one question: eliminating all other variables, is Ethernet good enough?
Blog
•Nov 3, 2024

The Future of High Performance Networking: Ultra Ethernet Explained

This article provides an overview of the Ultra Ethernet specification and its features, and is intended to provide an understanding of what is changing and why.
Blog
•Feb 7, 2025

Performance Benchmarking: Bun vs. C# vs. Go vs. Node.js vs. Python

I took 5 runtimes and built functionally identical REST APIs with each of them. Then I ran load tests for each application to measure their performance.
Blog
•Jun 13, 2023

PAN-OS and EDLs - Everything You Wanted to Know about External Dynamic Lists

Looking to implement external dynamic lists in your Palo Alto NGFW or Prisma Access? This post will answer all your questions about how EDLs work in PAN-OS to dynamically improve your security posture.
Blog
•Oct 10, 2023

What's new

SSL Certificate Validity Changes 2025: How to Prepare Your Business Now

Beginning in March 2026 SSL/TLS certificate will begin expiring after 200 days and will continue to be reduced each year until 2029 when validity will be down to just 47 days. This change aims to enhance security, reduce exposure from compromised certificates, and encourage automation, but will require significant changes in certificate management processes for many companies. Organizations should begin preparing now for shorter certificate lifespans and more frequent domain validations to avoid security risks and ensure reliable digital interactions
Blog
•Jun 5, 2025

Introduction to XQL: Building Your First Widget

Widgets transform XQL query results into interactive visualizations, aiding SOC analysts in identifying trends and anomalies. This article demonstrates using widgets to graph failed GlobalProtect logins, helping detect brute-force attacks and misconfigurations, and providing proactive assistance to users.
Blog
•Jun 4, 2025

The $2.3 Trillion Question: Why 84% of Digital Transformations Still Fail

Discover why most digital transformations struggle and learn practical strategies for success! This post explores how shifting from technology-first to business-first thinking can dramatically improve outcomes. Get actionable tips for aligning technology with real business needs and creating meaningful change that actually works.
Blog
•Jun 3, 2025

Building Scalable Engineering Support: The Story of the TOCE

The Technical Operations Center of Excellence (TOCE) revolutionizes engineering by providing strategic support, enabling engineers to focus on solving complex problems. Originating from a small initiative, the TOCE now enhances project continuity and customer engagement, evolving into a core function that strengthens and accelerates high-performance teams. What's next? Deeper integration and innovative support models.
Blog
•Jun 2, 2025

Guiding Principles and Best Practices for Coding Assistance Adoption

Guiding principles and best practices for evaluating and adopting coding assistance tools.
Blog
•Jun 2, 2025

CEO: Autonomous Super Agent - Sept 2040

The blog highlights the seismic shifts in technology and the rising dominance of AI, relegating human roles to the background and marking the beginning of a new era of Super AI capabilities.
Blog
•Jun 1, 2025

Pushing Unreal Engine to New Heights

WWT is back at Unreal Fest Orlando, and we can't wait to show you what we've been building. From June 2–5, 2025, at the Orange County Convention Center, you'll find us in the Expo Hall, ready to dive into real-time 3D innovation with hands-on demos, one-on-one chats, and a special live presentation from Kyle Lindsey on "Practical Digital Twins."
Blog
•Jun 1, 2025

From Cost Center to Strategic Enabler: Building the Business Case for NOC Modernization

In today's hyper-connected, always-on digital economy, businesses can no longer afford for their Network Operations Center (NOC) to be a passive, reactive function. What was once considered a cost center can now become a strategic enabler — one that drives uptime, customer and associate satisfaction, and competitive agility. NOC modernization isn't just a technical upgrade; it's a business imperative.
Blog
•May 29, 2025

Rethinking Vulnerability Management: A Next-Gen Approach

Cyber threats are rapidly evolving, exploiting vulnerabilities within hours. Traditional vulnerability management struggles to keep pace, necessitating a shift to Next-Generation Vulnerability Management (NGVM). By integrating continuous monitoring, risk-based prioritization and automation, organizations can enhance security resilience for proactive defense against sophisticated cyber threats.
Blog
•May 29, 2025

Why NOC Transformation Fails—And How to Get it Right

Avoid These 5 Common Mistakes to Set Your NOC Project Up for Success As organizations strive to modernize their operations, Network Operations Center (NOC) transformation has become a strategic imperative. But despite its importance, many NOC transformation projects stall—or fail outright. At World Wide Technology (WWT), we've seen the pitfalls firsthand, and we know what it takes to avoid them. Below, we break down the most common reasons NOC transformations fail—and how to overcome them.
Blog
•May 29, 2025

The Orca AI Journey with Southern California Edison

World Wide Technology is a proud sponsor of EEI 2025. Join us for our featured session, "The Orca AI Journey with Southern California Edison," in The Hub on Wednesday, June 4. In this insightful presentation, Carlos Carazo, Utilities Field CTO at World Wide Technology, and John Janney, Managing Director of Digital Grid Services at Southern California Edison (SCE), will discuss how SCE is transforming network operations with AI-driven solutions designed to enhance efficiency and scalability.
Blog
•May 29, 2025

A CTO'S Primer on Q-Day: Part 1 - The Post-Quantum Problem

Quantum computing's potential to break current encryption standards, known as Q-Day, poses a significant threat to cybersecurity. As experts race to develop post-quantum cryptography, balancing the risks and revolutionary potential of quantum technology is crucial for safeguarding our digital future.
Blog
•May 28, 2025

Make Summer Count: How Tech Leaders Use the Slow Season to Accelerate Strategy

While many treat summer as a slowdown, savvy tech leaders see it as a strategic goldmine. With fewer distractions, it's the perfect time to reassess operating models, accelerate automation, shape budget narratives and strengthen internal capabilities—ensuring your organization gains momentum now instead of scrambling during the Q4 crunch.
Blog
•May 28, 2025

Is Your Network Holding You Back

The State of Network Operations Today In today's rapidly evolving IT landscape, the demands placed on network operations have never been higher. Enterprises are racing toward digital transformation, embracing cloud-native architectures, and supporting hybrid workforces that stretch beyond traditional perimeters. Unfortunately, legacy Network Operations Centers (NOCs) were never built to handle this level of complexity, and it's starting to show.
Blog
•May 28, 2025

Inside the Next-Generation Network Operations Center

What Does a Modern NOC Look Like? As digital transformation accelerates, the traditional Network Operations Center (NOC) is being pushed beyond its limits. Static dashboards, reactive monitoring, and fragmented tools are no longer enough. Enterprises now require a dynamic, intelligent and scalable operations framework—one that can keep pace with the cloud-first, always-on world. Welcome to the Next-Generation NOC—a strategic evolution in network operations designed to deliver agility, visibility, and resilience across complex hybrid environments.
Blog
•May 28, 2025

The State of Cloud Security, Part 1: Understanding CNAPP

In the dynamic IaaS landscape, cloud security is increasingly complex, with AI and rapid changes posing challenges. CNAPP offers a unified solution, integrating multiple security tools for enhanced compliance and protection. However, selecting the right CNAPP requires careful consideration of specific needs and existing technology ecosystems.
Blog
•May 23, 2025

The State of Email Security

Email security threats continue to evolve, but in recent years, countermeasures seem to be evolving just as fast. Migration to the cloud has unlocked new options for organizations to stay ahead of the threat.
Blog
•May 22, 2025

Unlocking the Power of AI Coding Assistants

AI coding assistants are transforming software development by boosting productivity, enhancing code quality and facilitating continuous learning. These tools not only automate repetitive tasks but also provide insightful guidance, enabling developers to work smarter and more creatively. Embrace the future of coding, powered by AI, for better software and happier developers.
Blog
•May 22, 2025

Day-2 Operations: The Critical Data Center Network Component

While Day 0 planning and Day 1 deployment capture initial attention, Day 2 operations—ongoing monitoring, automation, compliance and optimization—account for up to 70 percent of total data center network costs. Without a proactive strategy, enterprises face rising expenses, outages and security risks. To reduce TCO and improve resilience, organizations are adopting AI-driven and automated platforms like Arista CloudVision and Cisco Nexus Dashboard to streamline Day 2 tasks. Investing in visibility, operational simplicity and intelligent automation is now essential for long-term success.
Blog
•May 20, 2025

Introduction to XQL: Custom Datasets for Threat Hunting

Both Cortex XDR and XSIAM let you go well beyond endpoint telemetry from the XDR Agent by ingesting custom datasets through the Broker VM. Forwarding Proxmox syslogs, you can analyze failed logins and suspicious system activity directly in XQL. This unlocks the ability to correlate hypervisor events with endpoint, network, and identity data—all in one platform. Tracking brute-force attempts against pvedaemon, custom datasets give you visibility into layers that traditional EDR misses.
Blog
•May 20, 2025

Blog

The WWT Blog features insights, event recaps, news and more from our technology and industry experts.

53 Followers

At a glance

667Total
667Blogs
What's related
  • Security
  • AI & Data
  • Digital
  • Data Center
  • Automation
  • Applied AI
  • Software Development
  • Cloud
  • Cybersecurity Risk & Strategy
  • Security Operations
  • Digital Workspace
  • Cisco
  • Networking
  • Primary Storage
  • Application Services
  • Customer Experience
  • AI Proving Ground
  • AI Security
  • Network Security
  • Palo Alto Networks

What's related

  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2025 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Cookies