cisco - News, Features, and Slideshows
cisco in pictures
Cisco reportedly skirted US sanctions in order to sell networking equipment to Russia's military.
By Jim Duffy | 22 May, 2015 04:39
Reports surfaced last week that Cisco may be close to buying hyperconvergence start-up Nutanix.
By Jim Duffy | 19 May, 2015 23:08
US House votes to end NSA dragnet...Wal-Mart set to compete with Amazon Prime...Chambers gets sentimental on earnings call...and more tech news.
By IDG News Service staff | 14 May, 2015 21:02
Cisco this week announced intentions to acquire Tropo, a developer of software designed to embed real-time communications within cloud applications.
By Jim Duffy | 08 May, 2015 01:19
Three men accused of selling and exporting over $10 million worth of fake Cisco networking equipment into the U.S. have been arrested by U.K. police.
By Loek Essers | 07 May, 2015 23:07
Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information.
By Jamey Heary | 13 May, 2015 07:29
Disaggregation seems to be all the rage in networking these days.
By Jim Duffy | 02 March, 2015 22:12
It was all the way back in the Spring of 2011 that Google released WebRTC, its nascent real-time, browser-based, HTML5-powered, no-plugin-required video chat project to the public. In the three and a half years since, the Internet Engineering Task Force and the W3C have been working together to try to formalize the standard, prepare the stable 1.0 release, and get it ready for prime time.
By Matt Weinberger | 22 November, 2014 01:07
The engineering reorganization currently underway at Cisco is intended to streamline product development and delivery to customers, Cisco says.
By Jim Duffy | 18 October, 2014 04:40
On the surface, Cisco and Juniper's SDN strategies seem to have sharp contrasts if recent announcements are any indication.
By Jim Duffy | 07 February, 2013 20:15
Whitepapers about cisco
What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
Protecting against known, and new, advanced, unknown threats requires the most rapid and precise detection and protection technologies. With multiple solutions available, finding the best one can be challenging. Independent testing firm Miercom took on this challenge and tested network-based advanced threat prevention solutions that use virtual sand boxing. They found the solution delivering the fastest, most accurate and efficient solution against known and unknown threats.
- ING Direct unveils Apple Watch app
- Woodside engineers to use IBM's Watson platform
- Technology One records half year revenue of $90m
- Charter reportedly close to $55 billion deal for Time Warner Cable
- Attackers use email spam to infect point-of-sale terminals with new malware
- Large scale attack hijacks routers through users' browsers
- Sharp phone cameras play slow-motion video at 2,100 fps
- DHS data centre consolidation almost completed
- Amazon.com may be working on Etsy competitor
- BlackBerry cutting staff in smartphone unit
- In Pictures: The 8 things we’re looking for at Google I/O 2015
- In Pictures: Hot stuff - The coolest drones
- Hacked Adult Friend Finder database offered for $17,000
- Design thinking, agile development at heart of building control system
- CSIRO opens $6m metal 3D printing centre