Introducing UCS S-Series: Data Unstored

I frequently meet with customers who are trying to “unstore” more of their data, use it in real time, and unlock the latent value that’s contained there. In many ways this is the heart of digital transformation…but it’s also something that’s historically been a challenge to do in an economical and manageable way as data […]

Vulnerability Spotlight: Foxit PDF Reader JBIG2 Parser Information Disclosure

Vulnerability discovered by Aleksandar Nikolic of Talos. Talos has identified an information disclosure vulnerability in Foxit PDF Reader (TALOS-2016-0201/CVE-2016-8334). A wrongly bounded call to `memcpy`, while parsing jbig2 segments within a PDF file, can be triggered in Foxit PDF Reader causing an out-of-bounds heap memory to be read into a buffer. The `memcpy` call is properly […]

How To Deploy from Jenkins to Any Data Center or Cloud

If you’re responsible for network, compute infrastructure, or even VM administration – DevOps can sound like mumbo jumbo: Continuous Integration. Continuous Deployment. DevOps tool chain. Branching. Release trains. Agile Development. Green/Blue. A/B. Yadda Yadda Yadda. You don’t need to understand all of that.  What you need to understand is that with Cisco CloudCenter, an automated […]

Now IT service providers are data brokers

Times are changing in the telecommunications industry. More people, devices and things are connected than ever before. And because of that, there’s a highly lucrative data boom. Mobile network operators and other service providers have the opportunity to go beyond their traditional roles and make the most of this information. Now’s the time to start […]