Cisco this week took the wraps off three products aimed at increasing the speed of communications while controlling and analyzing the substantial data stream of the factory floor.The products build on Cisco’s Connected Factory portfolio which offers a variety of technologies from networking and security to analytics the company says will help customers quickly and more securely integrate industrial automation and control with business systems while improving industrial and manufacturing operational costs and efficiency.+More on Network World: Ethernet: Are there worlds left to conquer?+To read this article in full or to leave a comment, please click here
It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here
It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here
It’s not at all uncommon for competitors to snipe at one another but it still makes for good reading and it provides an interesting look into a company’s strategy – and perhaps a signal to a competitor they are in for a fight.Today’s round comes from Juniper which has a piece of marketing out there that says: “In March 2017, Extreme Networks announced it will acquire Brocade's data center networking business. This acquisition has hindered Brocade/Extreme's ability to meet your long-term goals. They can no longer deliver networking solutions that will help you embark on your digital transformation journey. Juniper Networks can.”To read this article in full or to leave a comment, please click here
DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here
DARPA today said it the opened unique and massive testbed it will use as a battleground for researchers to build and test autonomous, intelligent and collaborative wireless technologies.Calling it a “magnificent electronic arena” The Colosseum will be primarily used to host the Defense Advanced Research Projects Agency’s $3.75 million three-year Spectrum Collaboration Challenge (SC2), which will pit researchers against each other to develop what the agency calls radically new technologies for “using and managing access to the electromagnetic spectrum in both military and civilian domains.”To read this article in full or to leave a comment, please click here
Broadcom this week introduced a family of Ethernet switches that support new technology aimed at helping users address the rising network implications of the Internet of Things, automotive networking and video applications.+More on Network World: Ethernet: Are there worlds left to conquer?+Key to that strategy is that the new family -- Broadcom StrataConnect BCM53570 – features support for an emerging Ethernet protocol technology called Time Sensitive Networks that brings standard deterministic real-time communications over Ethernet. The IEEE TSN standards define extremely precise, predictable timing across the network. By adding features to Ethernet such as time synchronization, ingress policing, seamless redundancy, frame preemption, scheduled traffic, and stream reservation, TSN ensures mission-critical, time sensitive data is not held up on the network, promoting an interoperable ecosystem spanning across many industries.To read this article in full or to leave a comment, please click here
Broadcom this week introduced a family of Ethernet switches that support new technology aimed at helping users address the rising network implications of the Internet of Things, automotive networking and video applications.+More on Network World: Ethernet: Are there worlds left to conquer?+Key to that strategy is that the new family -- Broadcom StrataConnect BCM53570 – features support for an emerging Ethernet protocol technology called Time Sensitive Networks that brings standard deterministic real-time communications over Ethernet. The IEEE TSN standards define extremely precise, predictable timing across the network. By adding features to Ethernet such as time synchronization, ingress policing, seamless redundancy, frame preemption, scheduled traffic, and stream reservation, TSN ensures mission-critical, time sensitive data is not held up on the network, promoting an interoperable ecosystem spanning across many industries.To read this article in full or to leave a comment, please click here
Cisco had a pretty large dump of security advisories today – seven “high priority” and one “critical” – impacting a variety of products many with the threat allowing a remote attacker to cause a denial of service.First up this week Cisco said a vulnerability in the Session Initiation Protocol (SIP) UDP throttling process of Cisco Unified Communications Manager (Cisco Unified CM) software could let an unauthenticated, remote attacker cause a denial of service (DoS) attack.+More on Network World: Cisco certifications target business professionals eyeing software roles+To read this article in full or to leave a comment, please click here
Trying to keep business professionals ahead of the rapidly changing technology environment, Cisco this week rolled out new business certificate and training packages.The package includes a certification-level offering for what’s known as a client advocate or a Customer Success Manager. The other certification has to do with helping business professionals learn how to build and transform corporations into the digital environment.+More on Network World: DHS warns on immigration spoofing scam+To read this article in full or to leave a comment, please click here
You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here
You could probably see this one and others like it coming, given the current immigration quagmire that is the United States immigration environment. Today the U.S. Department of Homeland Security issued a fraud alert saying criminals have been using the agency’s Hotline as part of a spoofing scam to steal personal information.+More on Network World: DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification+The DHS Office of Inspector General (OIG) said perpetrators of the scam represent themselves as employees with “U.S. Immigration” and can alter caller ID systems to make it appear that the call is coming from the DHS OIG Hotline telephone number (1-800-323-8603).To read this article in full or to leave a comment, please click here
True legends in any field are few and far between but Robert Taylor, who died last week at 85, was definitely was one in the field of computer networking.A key figure on the development of the Internet and ubiquitous Ethernet, Taylor was also instrumental in developing the first personal computer known as the Alto and a host of other computer and networking advances throughout his career. And his career was dotted with major positions at Advanced Research Projects Agency, the Stanford Research Institute, NASA, the Pentagon, Xerox and Digital Equipment Corporation.To read this article in full or to leave a comment, please click here
True legends in any field are few and far between but Robert Taylor, who died last week at 85, was definitely was one in the field of computer networking.A key figure on the development of the Internet and ubiquitous Ethernet, Taylor was also instrumental in developing the first personal computer known as the Alto and a host of other computer and networking advances throughout his career. And his career was dotted with major positions at Advanced Research Projects Agency, the Stanford Research Institute, NASA, the Pentagon, Xerox and Digital Equipment Corporation.To read this article in full or to leave a comment, please click here
True legends in any field are few and far between but Robert Taylor, who died last week at 85, was definitely was one in the field of computer networking.A key figure on the development of the Internet and ubiquitous Ethernet, Taylor was also instrumental in developing the first personal computer known as the Alto and a host of other computer and networking advances throughout his career. And his career was dotted with major positions at Advanced Research Projects Agency, the Stanford Research Institute, NASA, the Pentagon, Xerox and Digital Equipment Corporation.To read this article in full or to leave a comment, please click here
Avaya has filed a chapter 11 reorganization plan the company says will significantly reduce Avaya's pre-filing debt, strengthening its balance sheet and improve financial flexibility and position it for long-term success.+More on Network World: Avaya plan deploys network virtualization, segmentation to guard business jewels+Under the proposed plan, which must be approved by the United States Bankruptcy Court for the Southern District of New York a number of actions are proposed, including:To read this article in full or to leave a comment, please click here
Avaya has filed a chapter 11 reorganization plan the company says will significantly reduce Avaya's pre-filing debt, strengthening its balance sheet and improve financial flexibility and position it for long-term success.+More on Network World: Avaya plan deploys network virtualization, segmentation to guard business jewels+Under the proposed plan, which must be approved by the United States Bankruptcy Court for the Southern District of New York a number of actions are proposed, including:To read this article in full or to leave a comment, please click here
Avaya has filed a chapter 11 reorganization plan the company says will significantly reduce Avaya's pre-filing debt, strengthening its balance sheet and improve financial flexibility and position it for long-term success.+More on Network World: Avaya plan deploys network virtualization, segmentation to guard business jewels+Under the proposed plan, which must be approved by the United States Bankruptcy Court for the Southern District of New York a number of actions are proposed, including:To read this article in full or to leave a comment, please click here
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2.The IOS vulnerability is in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software which could let an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges, Cisco stated.+More on Network World: Cisco targets digital business transformation with new certifications+To read this article in full or to leave a comment, please click here
Cisco today issued two “critical” security advisories, one for Cisco IOS and Cisco IOS XE Software, the other for the ongoing discovery of problems with Apache Struts2.The IOS vulnerability is in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software which could let an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges, Cisco stated.+More on Network World: Cisco targets digital business transformation with new certifications+To read this article in full or to leave a comment, please click here