Report: Price of flash memory to drop faster, further in Q4

Report: Price of flash memory to drop faster, further in Q4

Back in August, TrendForce Research predicted that due to an oversupply in NAND flash memory, the price of SSDs could drop by 5% to 10% in the third quarter. Since then, the economy has only worsened and the oversupply has continued, and while TrendForce hasn’t reported the Q3 actuals, it’s now predicting 15% to 20% drop in NAND flash prices in the fourth quarter on top of the Q3 drop.. TrendForce says buyers of NAND…

Read More

CML 2.4 Now Supports Horizontal Scale With Clustering

CML 2.4 Now Supports Horizontal Scale With Clustering

When will CML 2 support clustering? This was the question we heard most when we released Cisco Modeling Labs (CML) 2.0 — and it was a great one, at that. So, we listened. CML 2.4 now offers a clustering feature for CML-Enterprise and CML-Education licenses, which supports the scaling of a CML 2 deployment horizontally. But what does that mean? And what exactly is clustering? Read on to learn about the benefits of Cisco Modeling…

Read More

Using bash options to change the behavior of scripts

Using bash options to change the behavior of scripts

Bash provides a large number of options that can be used to control the behavior of bash scripts. This post examines some of the more useful ones and explains how to display which options are in use and which are not. Exiting when an error occurs If you want a bash script to exit soon as it encounters an error—any error at all—in your scripts, you can add the set -o errexit option. If your…

Read More

Cisco UCS X-Series – 100G Unified Fabric for storage

Cisco UCS X-Series – 100G Unified Fabric for storage

Since the beginning, one of the key differentiators for Cisco UCS has been Unified Fabric. The ability to have a network adapter (VIC) and Fabric Interconnect support data, storage, and management traffic. This provides a simpler environment for server I/O needing fewer adapters, cables, and switches. Additionally, we have supported appliance ports on our Fabric Interconnects since the first generation. An appliance port allows you to directly connect to Ethernet storage without needing an additional…

Read More

Executive Briefing: Unit 42 Cloud Threat Report

Executive Briefing: Unit 42 Cloud Threat Report

Unit 42 is Palo Alto Networks’ world-renowned threat intelligence and security consulting team. The key headline of the latest Unit 42 Cloud Threat Report isn’t about the most sophisticated attacks. It’s that nearly all organizations we analyzed lack the proper controls to keep their cloud resources secure. The term for this in cloud security is identity and access management (IAM), and it refers to the policies that define who has permission to do what in…

Read More

What it Takes to Make Industry 4.0 a Reality

What it Takes to Make Industry 4.0 a Reality

By Michael Loggins, award-winning executive IT leader Industry 4.0 has vast potential to transform what factories can do. Manufacturing can be faster, more data-driven, more responsive to the needs of workers and customers, and more powered by innovations such as artificial intelligence, internet of things, digital supply chains, and blockchain. While the possibilities of Industry 4.0 are extraordinary—and realizing them is seemingly just within our reach—there are still obstacles to overcome before we can feel…

Read More

Strengthening Retail’s Resilience Against Ransomware

Strengthening Retail’s Resilience Against Ransomware

By Ashok Rutthan, Chief information security officer at Massmart Organizations of every size and sector are experiencing a rising tide of ransomware attacks, resulting in the collective global loss of billions of dollars and untold brand damage. Leaders are learning first hand the ways ransomware has become a scourge on smooth operations and financial well-being. Nowhere is this more true than in retail, where ransomware represents a unique set of challenges and risks. For retailers,…

Read More

Software supply chains at risk: The account takeover threat

Software supply chains at risk: The account takeover threat

Image: Adobe Must-read security coverage As recently exposed by Cisco Talos, software supply chain attacks have gained popularity amongst all kinds of cyber criminals. Once exclusively used by cyberespionage threat actors, these attacks have now also become attractive for any kind of cyber criminal, who sees in this threat a way to compromise hundreds or thousands of computers with one single operation. This explains why the software supply chain attack threat has more than tripled…

Read More

How NSO 6.0 Delivers Up To 9x Better Transaction Throughput

How NSO 6.0 Delivers Up To 9x Better Transaction Throughput

Join Developer Days in New York to Learn How to Get to 9X Two years ago we set out on a quest to tune Cisco Network Services Orchestrator (NSO) for massive deployments. The primary challenge was the transaction throughput since no one wants a network that is slow or non-responsive. Customers will shout before you know it “Make your code run faster” or “My system is hanging”. Today we are happy to announce that we…

Read More

Canadian Sentenced 20 Years in US Prison For Ransomware Attacks

Canadian Sentenced 20 Years in US Prison For Ransomware Attacks

A Canadian man was sentenced to 20 years in prison and ordered to forfeit $21.5m today for participating in the NetWalker ransomware attacks, said the Department of Justice (DOJ) Office of Public Affairs on Tuesday. Sebastien Vachon–Desjardins, 35, of Gatineau, Quebec, was extradited to the United States in January this year according to the extradition treaty between the United States and Canada. When Canadian law enforcement officers arrested Vachon–Desjardins in Gatineau, Quebec, they executed a search warrant…

Read More
1 2,729 2,730 2,731 2,732 2,733 4,179