Cisco aggiorna SD-WAN per semplificare configurazione e gestione

Cisco is launching a new version of its SD-WAN software that will expand the system’s reach and include new management capabilities. The most significant enhancement of Cisco SD-WAN version 17.10, expected to be released in December, is the ability to…

Schneider Electric strengthens ties with SAP to simplify IoT system integration

ERP giant SAP and industrial automation company Schneider Electric announced on Tuesday that they will expand their cooperation in the field of IIoT (Industrial Internet of Things) and digital transformation, focusing on sustainable infrastructure and ease of deployment. The two…

Zongheng Intelligent Control was invited to participate in the 2022 Chengdu Internet of Things Industry Innovation Application Summit

On November 23, under the guidance of the Sichuan Provincial Department of Economy and Information Technology and the Chengdu Municipal Economic and Information Technology Bureau, the Sichuan Provincial Internet of Things Industry Development Alliance, Huawei (Chengdu) Internet of Things Cloud…

Cisco announces $600 million restructuring plan, including layoffs

Cisco said today it will bear $600 million in charges related to layoffs and business restructuring. In its 8-K filing for the fiscal first quarter, the company announced a restructuring plan “to rebalance the organization and make further investments in…

AMD partners with Arm developers for exascale computing

AMD has announced plans to partner with French chip designer SiPearl to build an exascale supercomputing system that uses SiPearl’s Arm-based Rhea processors and AMD’s Instinct GPU accelerators. SiPearl is a relatively small startup that began operating in 2019, licensing…

Tecnologia di persistenza delle minacce informatiche su bilanciatori di carico F5 e Citrix

Negli ultimi anni, gli hacker hanno preso di mira i dispositivi di rete rivolti al pubblico, come router, concentratori VPN e bilanciatori di carico, per farsi strada nelle reti aziendali. Sebbene non sia raro trovare vulnerabilità nell'esecuzione di codice remoto in questi dispositivi,...

Contatto