Cisco Meraki Licensing

What’s on Meraki Per-Device Licensing

Meraki is introducing per-device licensing: an opt-in licensing model with exclusive, new features and enhanced flexibilityEvery customer.The mission of simplicity is real at Meraki – from our hardware, to our cloud-hosted dashboard, to even our licensing programs. This was the intent behind our cotermination licensing model (co-term): to create one simple expiration date for all devices in a given organization, and reduce the complexity of licensing for our customers.

Continue reading

Cisco Live EMEA

Cisco Live EMEA Barcelona 2020

Cisco Live is Cisco’s annual customer conference where you will build the foundation for your digital future in the cloud. Transform your outlook as well as your career and your potential through learning direct from Cisco’s best and brightest and cloud collaboration. From technical education to future-focused thought leadership, 1:1 meetings with Cisco experts to connecting with Cisco partners enjoy networking with your peers to having fun at the Customer Appreciation Event – Cisco Live 2020, Barcelona is the place to have it all.

Continue reading

Artificial Intelligence

Is Artificial Intelligence the Key for All Network Operations?

Making sure that you have the capacity required in the network at all times is an art. But with new artificial intelligence (AI) tools, that art can be easier to master. For the network to meet the goals set for the delay, damage, and availability in the network, capacity planning is required — a complex task where big...

Continue reading

iot-cybersecurity

Manufacturer Usage Description: Get to Know MUD

Manufacturer Usage Descriptions otherwise known as “MUD” facilitate’s device visibility and segmentation by allowing your network administrators to effortlessly identify a specific type of IoT device and then define the appropriate behaviors for that device. IoT manufacturers are able to disclose to us what devices are on the network, and what network policies they need for the devices to correctly function. This whitelist statement is something that customers can use to deploy access policies in their own networks without any guesswork.

Continue reading