Michael Cooney

Author Archives: Michael Cooney

Cisco CEO: “We are still only on the front end” of a new version of the network

Fresh off a positive earnings call that saw Cisco report $11.9 billion in revenue for the 2Q 2018 — a 3 percent increase from the same quarter in 2017 and the first time in 6 quarters the company reported year-over-year sales increases — CEO Chuck Robbins has a lot to crow about.  First of all, the company's most strategic new direction: The Network. Intuitive, more commonly known as intent-based networking is rapidly finding acceptance amongst customers, Robbins said.+RELATED: Getting grounded in intent-based networking; What is intent-based networking?+To read this article in full, please click here

Cisco taps into AI, collaboration with $125M MindMeld buy

Cisco said it would target collaboration applications first with artificial intelligence technology it will get from buying MindMeld for $125 million.The deal, announced today, is Cisco’s third in two weeks and nets the company MindMeld’s AI platform which lets customers to build intelligent, conversational interfaces for any application or device with its proprietary machine learning (ML) technology. Specifically, MindMeld develops what it calls Deep-Domain Conversational AI which essentially allows customers to embed voice commands in any applications and services.+More Cisco news On Network World: Cisco patches critical IOS security fault found after CIA WikiLeaks dump+To read this article in full or to leave a comment, please click here

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year.Cisco had in March issued a “critical” security advisory for the IOS software that runs on some 300 models of its Catalyst switches and other networking equipment.+More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed+Cisco this week wrote: “A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.”To read this article in full or to leave a comment, please click here

Cisco patches critical IOS security fault found after CIA WikiLeaks dump

Cisco this week said it patched a critical vulnerability in its widely deployed IOS software that was disclosed in the WikiLeaks dump of CIA exploits earlier this year.Cisco had in March issued a “critical” security advisory for the IOS software that runs on some 300 models of its Catalyst switches and other networking equipment.+More on Network World: FBI/IC3: Vile $5B business e-mail scam continues to breed+Cisco this week wrote: “A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges.”To read this article in full or to leave a comment, please click here

Verizon taps into open source, white box fervor with new CPE offering

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization-based enterprises.+More on Network World: Extreme offers glimpse of integrated Avaya, Brocade technology future+According to Verizon, letting customers use a combination of off the shelf hardware over a distributed deployment of OpenStack will let them decouple hardware from software and frees them from proprietary hardware. OpenStack is developed by some 150 companies from AT&T to IBM and Red Hat to Cisco, Dell EMC and others. The open software controls large pools of compute, storage, and networking resources throughout a data center, managed typically through a single dashboard.To read this article in full or to leave a comment, please click here

Verizon taps into open source, white box fervor with new CPE offering

Verizon this week said it would begin offering x86-based servers with OpenStack software aimed at customers looking to support all manner of advanced cloud, software defined networking and network functions virtualization-based enterprises.+More on Network World: Extreme offers glimpse of integrated Avaya, Brocade technology future+According to Verizon, letting customers use a combination of off the shelf hardware over a distributed deployment of OpenStack will let them decouple hardware from software and frees them from proprietary hardware. OpenStack is developed by some 150 companies from AT&T to IBM and Red Hat to Cisco, Dell EMC and others. The open software controls large pools of compute, storage, and networking resources throughout a data center, managed typically through a single dashboard.To read this article in full or to leave a comment, please click here

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here

FBI/IC3: Vile $5B business e-mail scam continues to breed

The FBI’s Internet Crime Complaint Center (IC3) this week said the plague it calls the Business Email Compromise continues to rack-up victims and money – over 40,000 worldwide victims and $5 billion in the latest count.+More on Network World: FBI/FTC: Watch those e-mails from your “CEO”+The BEC scam is typically carried out by compromising legitimate business e-mail accounts through social engineering or computer intrusion to conduct unauthorized transfers of funds, the IC3 stated. Most victims report using wire transfers as a common method of transferring funds for business purposes; however, some victims report using checks as a common method of payment. The fraudsters will use the method most commonly associated with their victim’s normal business practices. The scam has evolved to include the compromising of legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees, and may not always be associated with a request for transfer of funds, the IC3 stated.To read this article in full or to leave a comment, please click here

Ultimate geek dream? NASA challenges you to jump on the FORTRAN bandwagon!

NASA is looking to bolster the speed – from ten to 10,000 times -- of the software on its Pleiades supercomputer and is issuing a public challenge to get the job done.The catch is that the software the space agency is looking to squeeze all of that performance out of is based on Fortran – a program that has roots back to 1954.“This is the ultimate ‘geek’ dream assignment,” said Doug Rohn, director of NASA’s Transformative Aeronautics Concepts Program (TACP) in a statement.According to IBM: “From its creation in 1954, and its commercial release in 1957 as the progenitor of software, Fortran (FORMula TRANslator) became the first computer language standard, ‘helped open the door to modern computing,’ and may well be the most influential software product in history. Fortran liberated computers from the exclusive realm of programmers and opened them to nearly everybody else. It is still in use more than 50 years after its creation.To read this article in full or to leave a comment, please click here

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Trade commission finds Arista infringed on two original Cisco patents

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Arista infringed on two original Cisco patents, ITC finds

The legal ping-pong battle between Cisco and Arista Thursday found Cisco on the winning side as In the International Trade Commission ruled that Arista switches infringe on two core Cisco patents that the company says are key technologies in its network switching pantheon.+More on Network World: Arista gets important win over Cisco in patent battle+Mark Chandler, senior vice president, General Counsel and Secretary of Cisco wrote in a blog post of the Commission’s specific ruling that Arista was:To read this article in full or to leave a comment, please click here

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Fragmented, disorganized IT systems thwart feds ability to track visas

The technology issues involved in supporting about 27 distinct DHS information systems and databases hinder the effort by U.S. Immigration and Customs Enforcement (ICE) to track people who overstay their visas.That was the chief conclusion of a scathing Department of Homeland Security (DHS) Office of Inspector General (OIG) report on the status of ICE’s ability to track visa overstays.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

Extreme offers glimpse of integrated Avaya, Brocade technology future

In detailing its third quarter 2017 financial discussion Extreme CEO Ed Meyercord said the company was “locked and loaded” as it worked toward combining and integrating the two companies – Avaya and Brocade it is in the process of purchasing.Extreme a lot of work ahead as it combines Brocade's data center business and the network technology of Avaya Holdings– which is in Chapter 11 bankruptcy – both of which it said it would acquire in March. Extreme added that it has now integrated another buy it made, Zebra wireless with great success. Extreme said that in the third quarter alone four of its top 10 deals came from the Zebra side.To read this article in full or to leave a comment, please click here

1 42 43 44 45 46 83