Classifying and compartmentalizing information has been around within the Department of Defense before it was even called the Department of Defense. However, as DOD information that was once secured in vaults and safes has become ...
7-Zip is an open-source file archiving application which features optional AES-256 encryption, support for large files, and the ability to use "any compression, conversion or encryption method". Recently Cisco Talos has discovered...
Cisco's hackathon with a Silicon Valley school empowers students to solve problems in their community with the Internet of Things. If we want to ensure that the talent pipeline is robust and plentiful for the digital world, we nee...
It is spring time in Vienna now, the music is pervasive, and the Stadtpark is transforming into a place of epicurean delights. I vividly remember my student days when "Ich mochte nach Wien"was the most popular phrase for vacatione...
In a recent blog on "Why You Should Care About Model-Driven Telemetry", I reviewed the need for streaming telemetry and the high-level architecture that makes it possible. Today I'm going to drill down on some specific design...
Data Storytellers: Each month we'll be highlighting experts and advocates to share their data stories, knowledge, and insights into the future of data and analytics. Subscribe to the RSS feed to get the latest updates.Data is crea...
I'd like to draw your attention to a Cisco blog that came out recently from our Vice President of Global Marketing Karen Walker. Cisco has launched a new brand campaign based on the theme ofThere's Never Been a Better Time. In tal...
This post is authored by Holger Unterbrink. Patch Tuesday for May 2016 has arrived where Microsoft releases their monthly set of security bulletins designed to address security vulnerabilities within their products. This month's r...
To take the commercial drone industry from infancy to adulthood, there is a lot to be done. The lion's share of that work will involve companies working together to discuss technology, architecture, security, standards, and intero...
Throughout history, we've used labels to describe the attitude and characteristics of certain time periods in our past such as The Dark Ages, The Age of Discovery, and The Space Age to name a few. During the last 30 years of the I...
$81 million is what was stolen, undetected, out of a Bangladesh Bank account at the Federal Reserve Bank of New York. Unbelievable how the malware modified the SWIFT software and bypassed validity checks. This Bangladesh Bank brea...
Software engineering and developer communities are driving the market for cloud consumption and leading each industry into a new era of software-defined disruption. There are no longer questions about elastic and flexible agile de...