News

dell emc vxblock 1000
nw iot news internet of things smart city smart home5

A computer monitor displays code and a pixelated skull.

Cisco: DNSpionage attack adds new tools, morphs tactics

The group behind the Domain Name System attacks known as DNSpionage have upped their dark actions with new tools and malware to focus their attacks and better hide their activities.  Cisco Talos security researchers, who...

Chains of binary data.

How data storage will shift to blockchain

Move over cloud and traditional in-house enterprise data center storage, distributed storage based on blockchain may be arriving imminently.

hybrid cloud services data center network server private public

Gartner: IT spending to drop due to falling equipment prices

For once, the trends are in the favor of customers as IT equipment gets cheaper.

hovering drone / camera / propellor blades

No, drone delivery still isn’t ready for prime time

Despite incremental progress and limited regulatory approval in the U.S. and Australia, drone delivery still isn’t a viable option in the vast majority of use cases.

cloud comput connect blue

How and where to use serverless computing

Serverless computing is designed to automate infrastructure provisioning and eliminate the burden of server management.

intel generic cpu background

Intel follows AMD’s lead (again) into single-socket Xeon servers

Intel's new U series of processors are aimed at the low-end market where one processor is good enough.

K Computer supercomputer

Fujitsu completes design of exascale supercomputer, promises to productize it

Fujitsu and Japanese research institute Riken announced the design for the post-K supercomputer, to be launched in 2021, is complete and that they will productize the design for sale later this year.

compromised data / security breach / vulnerability

Cisco warns WLAN controller, 9000 series router and IOS/XE users to patch urgent security holes

Cisco says unpatched vulnerabilities could lead to DoS attacks, arbitrary code execution, take-over of devices.

abstract data

'Fiber-in-air' 5G network research gets funding

A consortium of tech companies and universities plan to aggressively investigate the exploitation of D-Band to develop a new variant of 5G infrastructure.

data center

Most data center workers happy with their jobs -- despite the heavy demands

An Informa Engage and Data Center Knowledge survey finds data center workers are content with their jobs, so much so they would encourage their children to go into that line of work.

big data / data center / server racks / storage / binary code / analytics

Startup MemVerge combines DRAM and Optane into massive memory pool

MemVerge software combines regular DRAM with Intel’s Optane DIMM persistent memory into a single clustered storage pool that doesn't require any changes to applications.

man in boat surrounded by sharks risk fear decision attack threat by peshkova getty

Cisco Talos details exceptionally dangerous DNS hijacking attack

Cisco Talos says state-sponsored attackers are battering DNS to gain access to sensitive networks and systems

IoT > Internet of Things > network of connected devices

Want to the know future of IoT? Ask the developers!

A new survey of internet of things (IoT) developers reveals that connectivity, performance, and standards are growing areas of concern as IoT projects hit production.

what is sdn 2 where is it going arrows fork in the road

What SDN is and where it’s going

Software-defined networking (SDN) established a foothold in cloud computing, intent-based networking, and network security, with Cisco, VMware, Juniper and others leading the charge.

geometric structure presents a networking pattern in lines of connection

Nyansa’s Voyance expands to the IoT

Voyance’s AIOps capabilities now cover a broad new range of devices.

exit sign expatriation cloud binary leaving the cloud

5 times when cloud repatriation makes sense

Even the cloud has its limits. In certain situations a traditional data center is the best place to host one or more applications.

broken chain metal link breach security

Gov’t warns on VPN security bug in Cisco, Palo Alto, F5, Pulse software

VPN packages from Cisco, Palo Alto, F5 and Pulse may improperly secure tokens and cookies, allowing nefarious actors an opening to invade and take control over an end user’s system.

Recognition of the best cloud network.

Cisco taps into AWS for data center, cloud applications

Cisco Cloud ACI for AWS lets customers manage and secure applications running in the data center or in Amazon Web Service cloud environments

Load More