Pepsico talks about the needs of AI-ready infrastructure at the manufacturing edge
1:57
Pepisco discusses their strategy to be AI-ready. The approach requires processing at the edge, including compute, storage, security and SD-WAN.
Related Videos
In Featured Video
-
Play video Closed-Loop Automated Troubleshooting
Closed-Loop Automated Troubleshooting
Stop chasing symptoms. Cisco AgenticOps correlates telemetry across device, network and application layers to isolate issues. AI Assistant resolves them automatically.
2:50
-
Play video Check Bug Applicability for Defect CSCws52722
Check Bug Applicability for Defect CSCws52722
TAC video on how to use the "Check Bug Applicability" tool for defect CSCws52722. Tags: sdwan,PSIRT,defect,applicability,vulnerability,CSCws52722,CVE
3:36
-
Play video Troubleshoot MongoDB Process Failure in Cisco Policy Suite
Troubleshoot MongoDB Process Failure in Cisco Policy Suite
This video demonstrates how to troubleshoot and restore a MongoDB Process failure in Cisco Policy Suite, caused by increased data path space utilization. Tags: CPS, Cisco Policy Suite, Replica Set, MongoDB
1:37
-
Play video Accessing Health with Data: Mercy Ships & Milton Keynes | Tech Unscripted
Accessing Health with Data: Mercy Ships & Milton Keynes | Tech Unscripted
How are Mercy Ships and Milton Keynes Hospital using data collection to transform accessing health? In this episode of Tech Unscripted, we explore the future of Tech for Healthcare and its role in improving global patient outcomes.
36:33
-
Play video Configure and Troubleshoot Multi-Preshared Key on 9800 Controller
Configure and Troubleshoot Multi-Preshared Key on 9800 Controller
This video demonstrates how to configure and troubleshoot Multi-Preshared Key (MPSK) on Cisco Catalyst 9800 controllers Tags:Cisco9800,WirelessNetworking,MPSK,WiFiSecurity
4:12
-
Play video Unified Branch Deployment with Agentic Workflows
Unified Branch Deployment with Agentic Workflows
Say goodbye to labor-intensive branch network deployments. Trigger deterministic Agentic Workflows that onboard, configure, and secure your network in minutes.
1:07