Cisco Blogs

Search Results

236 posts found

2015 Cisco VNI Complete Forecast Update: Key Trends Include Mobility, M2M and Multimedia Content

…of IP video, which includes Internet video, IP VoD, video files exchanged through file sharing, video-streamed gaming, and videoconferencing, will continue to garner the largest share of total global IP traffic. Globally, IP video traffic will account for 80 percent of all IP traffic by 2019 (see figure below). For more information and insights from the latest VNI study, I invite you to explore the following links: Watch Cisco’s VNI Fore…

Read More >>

Tags: , , ,

The Palms Casino Resort Wins Big with Cisco to Enhance the Guest Experience

…t only does Saint-Marc use the network to employ a private cloud to manage critical systems, such as the Palms’ gaming systems and email, but also to manage the Palms’ point of sale system for all purchases on the property, which includes over 1,200 gaming machines throughout the resort and casino, totaling 5,000 devices in all. “IT is a business enabler, allowing our business to grow while preparing for new technologies and guest services,” said…

Read More >>

Preparing for the Next Big Wave in IT: The Intercloud’s Role in Digitization

…y applications AND one that supports hyperscale applications (those cloud-native applications built for mobile, gaming, ecommerce, etc.).  We need to allow enterprise to deploy those new applications in hundreds of clouds and not just on their own private cloud. Enabling this kind of distributed application environment will require an agile, FAST IT development strategy combined with the right cloud platform to manage it. In addition, this cloud…

Read More >>

Tags: , , , , , , ,

Threat Spotlight: TeslaCrypt – Decrypt It Yourself

…s, including PC gamers. Just like irreplaceable photos, a game save, which is the product of countless hours of gaming, is extremely valuable and hard to replace. We have analysed two samples of TeslaCrypt, the first dated March 2015 and the second dated April 2015. Their SHA256 are: 3372c1edab46837f1e973164fa2d726c5c5e17bcb888828ccd7c4dfcc234a370 6c6f88ebd42e3ef5ca6c77622176183414d318845f709591bc4117704f1c95f4 Both samples implement the follow…

Read More >>

Tags: , , , ,

OSpod #28: An Interview with John Dickinson

…ing Swift as an origin for a lot of the content that they’re doing especially that’s popular in the gaming industry, financial industry is really sensitive about where their data lives. A lot of them are saying I’ve got all of these documents and I can’t give them to a different company so I have to make sure that they are safely and secured in my own data center and I need a way to do that scalably. They’re using Sw…

Read More >>

Tags: , , , , ,