IBM’s new Multi-cloud Manager will manage workloads on Big Blue clouds but also workloads on Amazon, Red Hat and Microsoft infrastructure as well
Stories by Michael Cooney
If you are a CIO or business leader and you are having trouble moving forward on a new or existing digital business project you should hack your current IT culture to get things moving.
That was but one of the key messages from Gartner analysts as they kicked off Symposium/IT Expo the consulting firm’s annual strategyfest that this year gathers over 9,000 CIOs and IT professionals for a look at the possible future of manifold technologies and trends.
The KSK rollover involved generating a new cryptographic public and private key pair and distributing the new public component to parties who operate validating resolvers, according to ICANN. Such resolvers run software that converts typical addresses like networkworld.com into IP network addresses.
According to Cisco, Duo’s zero trust security model authorizes secure connections to all applications based on the trustworthiness of users and devices. Duo’s cloud-delivered technology lets IT professionals set and enforce risk-based, adaptive access policies and get enhanced visibility into users’ devices and activities.
Cisco has exposed 13 vulnerabilities in its IOS and IOS XE switch and router operating software that the company said should be patched as soon as possible. The vulnerabilities were detailed in Cisco’s twice-yearly dump of IOS exposures and all have a High Impact security rating and should be evaluated by users as soon as possible.
According to the company’s website a major outage began at 0122 GMT on September 25 and shut down all Webex services from – Calling, Meetings, Control Hub, Hybrid Services and Team.
At the time the company stated that “Webex Teams services are currently impacted by an ongoing service outage. Engineering resources are online and working to restore services. We apologize for the impact and all hands are on deck to restore Teams, Meetings, Calling, Care and Context services.”
the Internet Corporation for Assigned Names and Numbers (ICANN) has voted to go ahead with the first-ever changing of the cryptographic key that helps protect the Internet’s address book – the Domain Name System (DNS).
More secure keys protecting the directory name system (DNS) are ready to deploy, but for those using DNS servers that haven't been upgraded, it could cause problems reaching Web sites.
Dynamic host configuration protocol simplifies and improves the accuracy of IP addressing but can raise security concerns
Cisco said that Integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers to quickly secure users to any application on any networked device.
Cisco and Google last October teamed up to develop a Kubernetes, hybrid cloud offering. Kubernetes, originally designed by Google, is an open-source-based system for developing and orchestrating containerized applications.
Extreme is still grappling with how to best integrate, use and effectively sell the technologies it has acquired from Avaya and Brocade in the past year as well as incorporate and develop its own products to do battle in the cloud, mobile and edge computing environments of the future. Remember too that Extreme bought wireless player Zebra Technologies in 2016 for $55 million.
Cisco says July Systems offers an enterprise-grade wireless location platform with features such as instant customer activation, data-driven behavioral insights, contextual rules engine and APIs.
Cisco announces the C-Series C4200 server, a 2RU box comprised of the C4200 chassis and C125 server nodes that boosts processor-core density 128% using AMD EPYC 7000 CPUs.
4M ‘well-paying’ IT jobs over the next decade will require practitioners certified in IoT, converged infrastructure, cloud and more, IDC/Cisco study says