www.wwt.com
Open in
urlscan Pro
198.200.139.195
Public Scan
Submitted URL: http://www.wwt.com/
Effective URL: https://www.wwt.com/
Submission: On June 19 via api from US — Scanned from DE
Effective URL: https://www.wwt.com/
Submission: On June 19 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to Content This browser is no longer supported. For the best WWT.com experience, please use one of our supported browsers. Safari Chrome Firefox Edge Menu Search wwt.com... Ctrl K Top page results See all search results Featured Solutions Networking Automation & Orchestration Software Defined WAN (SD-WAN) Mobility What's trending Careers Corporate Overview Corporate Evolving Supply Chain Operations with Automation Case Study Overview ATC Overview ATC Our work Corporate Cancel Help Center Log In Home Solutions & Services Solutions AI and Data Automation & Orchestration Cloud Data Center Digital Digital Workspace ESG Mobility Networking Security Transformation See all Solutions See all Solutions Services Application Services ATC Lab Services Consulting Services Customer Success Infrastructure Services Mergers & Acquisitions Strategic Resourcing Supply Chain & Integration See all Services See all Services Industries Financial Services Global Service Provider Healthcare Life Sciences Manufacturing Oil & Gas Public Sector Retail Utilities See all Industries See all Industries Partners Cisco Dell Technologies HPE NetApp f5 Intel NVIDIA Microsoft Palo Alto See all Partners See all Partners ATC Learning & Support AI Proving Ground Communities Cyber Range Events Labs & Learning Research About Footer Links Blog Careers Contact Us Diversity and Inclusion Locations News Sustainability MAKE THE RIGHT TECHNOLOGY DECISIONS FASTER. Inside the WWT ATC: Experience innovation like never before. Learn more WHAT MATTERS TO YOU? * Mobility * Cloud * Digital * Digital Workspace * Automation & Orchestration * Data Center Explore more JUST FOR YOU: * Mobility * Cloud * Digital * Digital Workspace * Automation & Orchestration * Data Center * Explore more -------------------------------------------------------------------------------- UPCOMING EVENTS * Move Toward a More Secure and Scalable Network by Adopting SSE | Research Jun 20, 2024 * Modernizing the Data Center to Capitalize on AI with Cisco at Cisco Live! | Beyond the Booth Jun 20, 2024 * TECDay Fayetteville Jun 20, 2024 FEATURED INSIGHTS Skip this card Skip Digital The 3 P's of Modern Gaming Experiences The future of gaming will be defined by studios that can deliver on the powerful trifecta of seamless performance, persistent progression and deep personalization. WWT Research • Jun 12, 2024 Skip this card Skip GenAI Part 2: Inside WWT GPT – How Retrieval Mechanisms Shape AI Responses This is the second article in a series exploring the technical foundations that power WWT GPT, a GenAI-powered chatbot developed to increase employee productivity. It focuses on the retrieval stage of the tool's RAG pipeline. WWT Research • May 7, 2024 Skip this card Skip GenAI Part 3: Inside WWT GPT – How Generation Processes Enrich AI Conversations This is the third article in a series exploring the technical foundations that power WWT GPT, a GenAI-powered chatbot developed to increase employee productivity. It explores how different generation processes impact AI conversations. WWT Research • May 8, 2024 Skip this card Skip GenAI Part 4: Inside WWT GPT – Orchestrating and Deploying RAG at Scale for Robust AI Performance This is the fourth article in a series exploring the technical foundations that power WWT GPT. It details the importance of orchestration, performance testing, role-based access control (RBAC), and feedback collection mechanisms as applied to the tool. WWT Research • May 28, 2024 Skip this card Skip AI Solutions WWT CEO: 'Thrilled' About Expanding HPE Partnership To Deliver 'Transformative AI Outcomes' 'I am thrilled about our expanding partnership with HPE and the impact we can make on our customers by delivering transformative AI outcomes,' says WWT CEO Jim Kavanaugh. 'Together, let's shape the future of AI!' News • May 1, 2024 FEATURED NEWS Skip this card Skip Global Service Provider Forging the Path at World Wide Technology with Tonya Stopke In this podcast, Tonya Stopke discusses WWT's evolution into a global tech leader, their pioneering work in AI, and their significant investments in staying at the forefront of innovation. News • May 22, 2024 Skip this card Skip Why WWT There's a Right Way and a Wrong Way to Run an Internship Program Inc: Interns provide fresh perspective, a talent pipeline, and of course, an extra set of hands. What are you providing in return? News • May 20, 2024 Skip this card Skip Cyber Resilience NightDragon, Cisco, WWT Partner with NPower to Drive Talent Diversity in Cyber Industry Organizations are committed to raising awareness for closing the talent gap and increasing diversity within the cybersecurity industry News • May 8, 2024 Skip this card Skip Why WWT America's Greatest Workplaces for Diversity 2024 Newsweek presents the top large and mid-size companies, like WWT, who are recognized by their employees for genuinely respecting and valuing individuals from different walks of life. News • May 1, 2024 See all News TRENDING AT WORLD WIDE TECHNOLOGY Case Study • Dec 8, 2022 Evolving Supply Chain Operations with Automation ATC Insight • Jun 25, 2019 Intel® Optane™ DC Persistent Memory Re-Imagines Our Data-centric Future Article • May 25, 2023 How to Clone Objects in C# .NET Core WWT Research • May 16, 2024 Secure Your Future: A CISO's Guide to AI THE LATEST Skip this card Skip Cyber Resilience Partner POV | Kubernetes Data Resiliency for your Business-Critical Applications Veritas provides data management and persistent storage for your stateful Kubernetes applications, enabling cyber resiliency, cloud-native optimization, and application availability. Are you ready to transform K8s data management for your organization? Video • 1:48 Jun 19, 2024 Skip this card Skip Optical Networking Nokia 1830 Alien Wave Tutorial In this video, you will see the steps to quickly and easily provision an Alien wave on the Nokia 1830 PSI-8L optical line system. This video tutorial also has a lab available should you wish to physically perform the procedure yourself. Video • 17:17 Jun 19, 2024 Skip this card Skip MPLS and Segment Routing Core Routing Solutions: Nokia 7250 IXR-R6d In this video we explore Nokia's 7250 IXR-R6d router, including its hardware specifications, common use-cases, and our WWT opinion of the solution. For any questions about this product, or to learn more, please reach out to us at CoreNetworkingHelp@wwt.com Video • 5:14 Jun 19, 2024 Skip this card Skip High-Performance Architecture (HPA) Partner POV | AI/ML Data Center Networking on Ethernet In part one of this blog series that outlines the key role that networking plays in AI/ML workloads, we examine data transfer protocols and congestion considerations. Partner Contribution • Jun 19, 2024 Skip this card Skip Networking Move Toward a More Secure and Scalable Network by Adopting SSE | Research Adoption of Secure Service Edge (SSE) platforms, which provides security and policy enforcement right at the cloud edge, is accelerating and remains key to realizing a full SASE model. In this episode of WWT Research, Technical Solutions Engineer Nicole Portell outlines steps you can take to implement SSE for a secure, scalable and flexible network architecture that optimizes traffic flows and optimizes user experience. Video • 32:17 Jun 17, 2024 Skip this card Skip Networking Maximizing Utility Assets Through Programmatic Lifecyle Management | Experts As utility companies look to modernize aging infrastructure, effective lifecycle management of network assets is crucial. Yet many struggle to refresh assets across widespread, remote networks in a timely manner. In this episode of WWT Experts, industry director for utilities and energy Adam Nathan talks with global PMO director David Tunks about how utilities can benefit from a programmatic, data-driven approach to asset lifecycle management. Video • 36:11 Jun 17, 2024 Skip this card Skip Application & API Security Partner POV | AI Gateways vs. API Gateways: What's the Difference? It's critical to understand their unique roles to properly design AI infrastructure that can handle the requirements of modern applications. Partner Contribution • Jun 17, 2024 Skip this card Skip F5 BIG-IP Next Central Manager installing and configuring on vSphere BIG-IP NEXT Central Manager (CM) represents the next-generation management suite for the new BIG-IP OS across hardware and software instances. It provides simplified lifecycle and configuration management across F5 BIG-IP NEXT fleets, a concept not covered in this lab. Two primary methods for managing BIG-IP NEXT instances via Central Manager software are through a web browser-based portal or via API-based templates. This lab will use the UI. Advanced Configuration Lab 40 launches See more SUGGESTED COMMUNITIES Skip this card Skip Army GEMSS Digital Modernization Community The Army GEMSS EA is your one-stop-shop for Cisco network security, software, design and support services, and training. World Wide Technology is a Cisco Systems Gold Partner, combining our shared expertise to provide the U.S. Army with the latest Cisco products and innovations to serve the American Soldier. Public Community Skip this card Skip Associate Academy This Community Page illustrates and highlights key aspects of the various early in career programs the Global Workforce Enablement supports and serves as a centralized location of relevant topics for stakeholders. Public Community Skip this card Skip Hour of Cyber Hour of Cyber is a private thought-leadership event hosted monthly for security leaders to connect with WWT experts and executive advisors. Public Community Skip this card Skip Secure, All Together Connect with other security professionals. Share knowledge, share jokes, meet new people and make the world a safer place. Public Community See more TRENDING IN SECURITY Skip this card Skip Network Security ⏰ Disarm Me CTF: Hack, Decrypt, Disable This is a red team-style mixed capture the flag event that will require you and your team to actively break into an internal network as if you were a hacker. Put on your big kid pants cause this is big time! Thousands of organizations across the world are grappling with a new supply chain ransomware attack. A nefarious collective of hackers called The League has taken credit, but a consortium of affected organizations is turning to SAVE to take a stand… asking players to turn the tables on The League by breaking into its own network to obtain a release code that would win back their stolen data. Cyber Range May 30, 2024 • 3pm Skip this card Skip Security Transformation Secure All Together: 5 Principles for Building a Culture of Cybersecurity Cyber adversaries are becoming more skilled — and more ruthless. Protecting your organization requires a team approach within organizations, with the broad partner ecosystem and across all industries. Article • Jan 2, 2024 Skip this card Skip AI Security Embracing the Benefits of Generative AI in Cybersecurity Operations Organizations across the globe are weighing the security implications of adopting generative AI and LLMs in a corporate environment. Security teams need to embrace the moment and use these tools to increase speed and efficiency, augment staff and resources, and boost productivity. Article • Jul 24, 2023 Skip this card Skip AI & Data The Security Implications of Adopting Large Language Models and Generative AI Learn about instances where data breaches have occurred due to the use of third-party LLMs and generative AI, and why CISOs must develop robust policies to counter the risks associated with shadow AI. Article • Jun 9, 2023 See more TRENDING IN CLOUD Skip this card Skip Cloud 6 Key Concepts Driving Cloud Success As adoption continues to soar, it's worth pausing to consider some basic drivers behind cloud's growing value as a tool for digital and business transformation. Article • Nov 7, 2022 Skip this card Skip Cloud Mature Your Cloud Marketplace Capabilities to Drive More Value Out of Your Cloud Strategy | Research Cloud marketplaces are designed to help optimize cloud costs. But for all the potential they offer, we've found our client base can struggle to extract the full value of cloud marketplaces. Join WWT's Joshua Bushman and Lauren Fleming, both authors of the recently published Cloud Marketplace Maturity Model report, as they talk about a framework for simplifying, streamlining and scaling how organizations buy, deploy and manage cloud solutions across their business. Webinar Jul 13, 2023 • 4pm Skip this card Skip Cloud Exploring the Symbiotic Relationship Between Cloud and AI | Experts The relationship between AI and cloud is increasingly sybmiotic. Growing investment in cloud is driving faster adoption and spend on artificial intelligence (AI), while the majority of AI applications are developed in the cloud. AI can be used to automate complex tasks in cloud computing, optimize system performance, and improve user experience; while cloud computing provides the computing resources and infrastructure needed to train and deploy AI models at scale. Join Neil Anderson, who leads WWT's cloud and infrastructure practice, as he dives into the implications AI is having on cloud, and vice versa. Neil talks with detail about how AI is affecting cloud cost management and optimization, how IT leaders can secure use of AI in their cloud solutions, how high performance architectures needed to run AI will impact cloud strategies and common AI applications best suited for the cloud. Webinar Sep 26, 2023 • 4pm Skip this card Skip Cloud Accelerating Cloud Adoption in the Public Sector A framework for state agencies and higher-education institutions to overcome the most persistent barriers to cloud adoption. Article • Oct 5, 2023 See more TRENDING IN DIGITAL TRANSFORMATION Skip this card Skip Software Development How to Clone Objects in C# .NET Core There are numerous ways to clone an object in C# .NET Core. This article explores some of the approaches you can use to make a deep copy of an object and the pros and cons of each method. Article • May 25, 2023 Skip this card Skip Customer Experience A Platform and Ecosystem to Make the Right Technology Decisions Faster Make smart technology decisions fast, and mitigate the risk inherent in solving complex business challenges with even more complex technology solutions. Case Study • Jun 26, 2023 Skip this card Skip Customer Experience How to Keep Customers Happy with AI for CX | WWT Experts Data-driven organizations create more strategic, purposeful customer experiences that lead to higher customer engagement, increased loyalty and increased revenue. AI is a key component for gathering and analyzing data in real-time to make smart decisions quickly. However, many leaders struggle with unlocking the value of data and bringing AI into the mix. It shouldn't be this difficult. We know leaders want to become more data driven. And AI can act as a key accelerant. Join WWT Managing Director of AI and Machine Learning Tim Brooks as he answers that question plus discusses specific ways AI is being used to get the job done. Tim also outlines practical steps organizations can take now to become a company built around data as they shift toward making more data-informed decisions. Webinar Apr 4, 2023 • 4pm Skip this card Skip Software Development How and Why to Create Safety Within Your Teams Every person in every organization creates a psychological zone around them. This zone influences how those around them think and feel. Those that can increase feelings of safety can also significantly strengthen their team's performance. Article • Nov 10, 2020 See more TRENDING IN INFRASTRUCTURE MODERNIZATION Skip this card Skip Automation & Orchestration Evolving Supply Chain Operations with Automation How an enterprise-wide automation strategy is allowing WWT to scale in the face of rapid growth. Case Study • Dec 8, 2022 Skip this card Skip Server Infrastructure Intel® Optane™ DC Persistent Memory Re-Imagines Our Data-centric Future Intel® Optane™ DC Persistent Memory is a new tier in the memory/storage hierarchy that enables fast affordable memory capabilities can improve business functionality. ATC Insight Jun 25, 2019 Skip this card Skip Automation & Orchestration How to Automate Everything Right: WWT's 6 Principles of Automation Automation plays a critical role in our daily work, touching solutions that span technologies, partners and industries. In our many years of working with clients, we've identified six principles that can help organizations automate everything right. Article • Mar 1, 2024 Skip this card Skip Data Center Networking 6 Steps to Understanding Cisco ACI When understood, these six concepts will help anyone new to ACI to understand a more detailed technical discussion. Article • Jun 28, 2023 See more TOP LABS Skip this card Skip Network Security Cyber Range - Initiation Initiation is a Capture the Flag (CTF) lab meant to introduce you to the WWT Cyber Range platform and serve as a tutorial for future events. You will be introduced to the features and functionality as well as provided tips for success during future WWT Cyber Range CTFs. This lab will also allow you to test your access using the same platform we use for our live CTF events so you can make sure you will be ready on game day. Advanced Configuration Lab 897 launches Skip this card Skip AI Solutions AIPG: Innovation Lab with NVIDIA DGX NVIDIA DGX H100 integration and validation environment for enterprise AI workflows. Advanced Configuration Lab Skip this card Skip Cisco ACI Fundamentals Lab Part 1 This lab is the Cisco ACI Fundamentals Lab Part 1, and after completion, the student can launch Cisco ACI Fundamentals Lab Part 2 to complete the entire lab. The lab uses the ACI virtual simulator based on ACI Version 6, emulating an APIC, 2 leafs, and a spine. Part 2 uses a shared physical ACI fabric to complete the policy and verify data plane connectivity. The ACI Virtual Simulator was needed to demo the building of the ACI fabric from scratch, bootstrapping the APIC, adding the spine and leafs, fabric discovery, and completing VMM integration. Since the Cisco ACI Fundamentals Lab, Part 2 is a shared on-demand environment, to decouple the APIC build process from the APIC policy creation. Due to limitations, the virtual ACI fabric is a control plane-only simulator, and no data plane testing (Ping, SSH) can get done for validation. Cisco ACI Fundamentals Lab Part 2 uses a Tenant inside of a physical ACI, and data plane functionality can get tested ( Ping, SSH) Foundations Lab 2538 launches Skip this card Skip AI Solutions Run:ai Researcher Sandbox Welcome to the Run:ai Researcher Sandbox hosted on Dell's Validated Design for Generative AI in the Enterprise. Sandbox Lab 63 launches Skip this card Skip Software Defined WAN (SD-WAN) Cisco Catalyst SD-WAN (Viptela) Foundations Lab (20.9.3) The Cisco Catalyst SD-WAN Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of Cisco's SD-WAN solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure. Foundations Lab 282 launches Skip this card Skip AI Solutions Retrieval Augmented Generation (RAG) Walk Through Lab This lab will go into the basics of Retrieval Augmented Generation (RAG) through hands on access to a dedicated environment. Foundations Lab 113 launches Skip this card Skip Infrastructure Automation Pure Ansible Automation Lab If you are familiar with Ansible and want to learn how to use Ansible with the Pure Storage FlashArray, continue on with this lab that demonstrates how to simplify automation of a Pure Storage FlashArray. *** If you are a Storage admin, new to automation, and want to learn how to automate your Pure Storage environment using Ansible, check out this lab instead that teaches the basics of Ansible from a storage admin point of view.- "Ansible Automation Workshop - Pure Ansible Lab" (https://www.wwt.com/lab/ansible-automation-workshop-pure-ansible-lab) Advanced Configuration Lab 972 launches Skip this card Skip Network Security Fortinet NGFW Foundations Lab The Fortinet Next Generation Firewall (NGFW) Foundations Lab is a capability of the Advanced Technology Center (ATC) designed to provide an environment to gain hands-on experience with the fundamental features of the Fortinet NGFW solution. The environment that supports the lab is completely virtual, removing any hardware dependencies associated with physical infrastructure. Foundations Lab 1073 launches See more PARTNER SPOTLIGHT: NETSCOUT Skip this card Skip Follow NetScout NETSCOUT platforms provide pervasive real-time visibility with the insights needed to assure the performance, reliability and security of your digital business services. Partner Skip this card Skip Networking Maximizing Utility Assets Through Programmatic Lifecycle Management | Experts As utility companies look to modernize aging infrastructure, effective lifecycle management of network assets is crucial. Yet many struggle to refresh assets across widespread, remote networks in a timely manner. In this episode of WWT Experts, industry director for utilities and energy Adam Nathan talks with global PMO director David Tunks about how utilities can benefit from a programmatic, data-driven approach to asset lifecycle management. Webinar Jun 18, 2024 • 4pm Skip this card Skip Cloud Partner POV | NetScout and AWS Partnership Overview The partnership between NetScout and AWS is based on four pillars: technology alignment, AWS Marketplace offerings, go to market activities, and partner designations. Video • 3:20 Apr 4, 2024 Skip this card Skip Network Security Partner POV | AED Adaptive DDoS More than 13 million DDoS attacks were launched last year. NetScout's Arbor Edge Defense delivers adaptive DDoS protection. Video • 3:07 Mar 7, 2024 UPCOMING EVENTS * Move Toward a More Secure and Scalable Network by Adopting SSE | Research Jun 20, 2024 * Modernizing the Data Center to Capitalize on AI with Cisco at Cisco Live! | Beyond the Booth Jun 20, 2024 * TECDay Fayetteville Jun 20, 2024 -------------------------------------------------------------------------------- EXPLORE MORE Skip this card Skip SASE Secure Access Service Edge (SASE) Briefing The cloud, remote work, evolving working habits and an increasingly technology savvy workforce has changed how and where people are connecting to applications and critical resources. These changes are forcing enterprise networks to change to provide secure access. This briefing will explain how the network and security worlds are colliding to deliver Secure Access Service Edge (SASE) and how your organization can prepare to take advantage of the Secure Business outcome that SASE provides. Briefing Skip this card Skip Zero Trust Segmenting Complex Environments Using Cisco ACI ACI is a powerful technology offering rich features for SDN to include application-centric security segmentation, automation and orchestration in the data center. White Paper • Jun 3, 2023 Skip this card Skip Zero Trust Cisco ACI Segmentation Migration Video Implementing an application-centric mode to specifically meet a segmentation strategy and zone architecture requires a different approach — one referred to as the hybrid model. Video • 19:21 • Jan 10, 2023 Skip this card Skip ADVANCED CONFIGURATION LAB Zero Trust ASAv integration in Cisco ACI using PBR Service Graph redirection Lab The goal of this lab is to show how policy-based redirection to a L4-7 device can be used with a single bridge domain needed for Cisco ACI fabrics. The use of a single bridge domain and single PBR redirection is known as "one-armed mode." Advanced Configuration Lab • 45 launches Skip this card Skip Cybersecurity Risk & Strategy API Security Fundamentals: An Introduction (and What Does the Super Bowl Have to Do With It?) Let's delve into all things API security, particularly aimed at global financial institutions. Here, I cover the basics and provide an overview of WWT's approach (with a Super Bowl-themed twist). Next, I'll cover API discovery; then API focused threat detection, prevention and response; and lastly, API security testing and validation. Blog • Jan 26, 2022 Skip this card Skip SASE Cisco Secure Edge (Umbrella) SIG Integration With Cisco SD-WAN Cisco Secure Edge (formerly Umbrella) provides DNS-layer security, secure web gateway (SWG), cloud-delivered firewall, and cloud access security broker (CASB) in a single, cloud-native, security platform. Cisco Secure Edge can be seamlessly integrated into Cisco SD-WAN using feature and device templates in vManage. This integration with SD-WAN gives you the ability to rapidly deploy Umbrella SIG services to hundreds or thousands of remote office locations throughout the world. With Cisco Secure Edge and SD-WAN you can create a global scale secure access fabric that is highly available! Video • 4:57 • May 29, 2023 Skip this card Skip Customer Experience Reimagining a National Media Company's Digital Future in the Age of Streaming WWT helped a media company build a robust, data-centric technology platform that forges deeper connections with its 200M users, personalities and brands while leveraging an innovative business model to monetize content. Case Study • Oct 27, 2022 Skip this card Skip Customer Experience Hybrid Cloud Makes Building Financial Marketplaces Easier A new generation of banking customers wants a full-service marketplace at their fingertips. Building them one requires a lot of moving parts. Let's take a look at what's involved and how WWT's hybrid cloud approach links it all together. Article • Jul 19, 2022 Skip this card Skip Software Defined WAN (SD-WAN) What is SD-WAN? Top Benefits and Picking a Trusted Vendor SD-WAN is the next generation of WAN edge networking. Learn what it is, how it works, how it's different from traditional branch routing, and how to select a trusted vendor. Article • Jun 3, 2023 Skip this card Skip Software Defined WAN (SD-WAN) SD-WAN Technology Briefing Software-defined WAN offers organizations flexible connectivity, facilitates cloud strategies and improves application performance, all in a secure environment. It also can improve operational efficiencies and help control or reduce WAN costs. Approaches to SD-WAN implementation and supported capabilities vary from one OEM to another. This briefing will explore four of the top SD-WAN vendors and highlight the innovative features that set each of their solutions apart, including a live demonstration of our on-demand SD-WAN lab environments and explanation of how to access them. Briefing Load more * About * Careers * Locations * Diversity & Inclusion * Help Center * Sustainability * Blog * News * Press Kit * Contact Us © 2024 World Wide Technology. All Rights Reserved * Privacy Policy * Acceptable Use Policy * Information Security * Supplier Management * Quality * Cookies