Sep
29
2010
Cisco regular expressions
Using-regular-expressions-with-the-Show-command

The origins of regular expressions lie in automata theory and formal language theory, both of which are part of theoretical computer science. These fields study models of computation (automata) and ways to describe and classify formal languages. In the 1950s, mathematician Stephen Cole Kleene described these models using his mathematical notation called regular sets. The SNOBOL language was an early implementation of pattern matching, but not identical to regular expressions. Ken Thompson built Kleene’s notation into the editor QED as a means to match patterns in text files. A regular expression is entered as part of a command and is […]

Sep
27
2010
Cisco has acquired ExtendMedia
Cisco-has-acquired-ExtendMedia

On September 23 2010, Cisco announced it has completed its acquisition of privately-held ExtendMedia, a leading provider of software-based Content Management Systems (CMS) that manage the entire lifecycle of video content through monetization for pay media and ad-supported business models. Based in Newton, Mass., with the majority of its employee base in Toronto, Canada, ExtendMedia enables Cisco to help service providers deliver multi-screen offerings as the market transitions to IP video. “As the video market transitions and consumers expect multi-screen engagement, service providers are enhancing their infrastructure to manage and deliver video to any device while providing a rich user […]

Sep
23
2010
Cisco AnyConnect for the iPhone
AnyConnect-iphone-3

Three days ago, Cisco has released the Cisco AnyConnect Secure Mobility Client for the iPhone (iOS 4), but what is it? The Cisco AnyConnect Secure Mobility Client provides remote users with secure VPN connections to the Cisco ASA 5500 Series using the Secure Socket Layer (SSL) protocol and the Datagram TLS (DTLS) protocol. The Cisco AnyConnect Secure Mobility Client for Apple iOS provides seamless and secure remote access to enterprise networks. The client provides a full tunneling experience that allows any installed application to communicate as though connected directly to the enterprise network. It runs on Apple iOS version 4.1 […]

Sep
21
2010
Arch Rock is now part of Cisco
Arch-Rock-is-now-part-of-Cisco

Cisco has completed its acquisition of privately held Arch Rock Corporation, a pioneer in Internet Protocol-based wireless network technology for smart-grid  applications.  Based in San Francisco, Arch Rock will accelerate Cisco’s ability to facilitate the utility industry’s transition to an open and interoperable smart grid by enabling Cisco to offer a comprehensive and highly secure advanced metering infrastructure solution that is fully IP and open-standards based. “Arch Rock’s wireless mesh technology enhances Cisco’s IP-based, end-to-end smart-grid offerings,” said Laura Ipsen, senior vice president and general manager of Cisco’s Smart Grid business unit. “This acquisition further positions Cisco as a strategic […]

Sep
20
2010
Cisco IOS Keyboard Shortcuts
Cisco-IOS-Keyboard-Shortcuts

A number of shortcuts exist within the IOS command line interface. The most famous shortcut is the ‘TAB’ command, that completes a partially typed CLI command. For istance, if you type “sh ru” and press TAB, it will complete the command as “show running-config“. Below the complete list of the IOS shortcuts: Ctrl+T: Swap the current character with the one before it Ctrl+K: Erase all characters from the current cursor position to the end of the line Ctrl+X: Erase all characters from the current cursor position to the beginning of the line Ctrl+L: Reprint the line Ctrl+C: Exit configuration mode

Sep
6
2010
July & August 2010: ten Cisco vulnerabilities
Cisco-vulnerabilities

The The Cisco Product Security Incident Response Team (PSIRT) has published ten important vulnerability advisories: Cisco IOS XR Software Border Gateway Protocol Vulnerability Cisco Unified Communications Manager Denial of Service Vulnerabilities Cisco Unified Presence Denial of Service Vulnerabilities Cisco IOS Software TCP Denial of Service Vulnerability Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine SQL Injection Vulnerability in Cisco Wireless Control System Multiple Vulnerabilities in Cisco ASA 5500 Series Adaptive Security Appliances Multiple Vulnerabilities in Cisco Firewall Services Module CDS Internet Streamer: Web Server Directory Traversal Vulnerability Hard-Coded SNMP Community Names […]

Jul
13
2010
Hub & Spoke: an example of VRF-Lite
vrf-lite-virtual-connection

VRF is an extension of IP routing that provides multiple routing instances. It provides a separate IP routing and forwarding table to each VPN and is used in concert with MP-iBGP (Multi-Protocol internal BGP) between provider equipment (PE) routers to provide Layer 3 MPLS-VPN. However, ML-Series VRF implementation is without MP-iBGP. With VRF Lite, the ML Series is considered a PE-extension or a customer equipment (CE)-extension. VRF Lite is considered a PE-extension since its has VRF (but without MP-iBGP), and it is considered a CE-extension since this CE can have multiple VRFs and serves many customer with one CE box. […]

Jul
5
2010
Rhinnovation: the winner of I-Prize contest
Rhinnovation-the-winner-of-I-Prize contest

Do you remember the Cisco I-Prize contest, an open, global innovation contest developed to encourage collaboration among entrepreneurs and help identify new potential billion-dollar business ideas for Cisco? A team of five university students from Mexico submitted the winning idea of a ‘Life Account‘ that gathers information about users through connected devices in the physical world and online data available in the virtual world. The winners receive a cash prize of $250,000.

Jul
1
2010
June 2010: two Cisco vulnerabilities
Cisco-vulnerabilities

The The Cisco Product Security Incident Response Team (PSIRT) has published two important vulnerability advisories: Vulnerabilities in Cisco Unified Contact Center Express Cisco Application Extension Platform Privilege Escalation Vulnerability Vulnerabilities in Cisco Unified Contact Center Express Cisco Unified Contact Center Express (UCCX or Unified CCX) contains a denial of service (DoS) vulnerability and a directory traversal vulnerability. These vulnerabilities are independent of each other. Exploitation of these vulnerabilities could result in a DoS condition or an information disclosure.

Jun
15
2010
Cisco Announces Agreement to Acquire CoreOptics

Cisco announced its intent to acquire privately held CoreOptics Inc., a designer of digital signal processing (DSP) solutions for high-speed optical networking applications. Based in San Jose, with the majority of its employee base in Nuremberg and Gerlingen, Germany, CoreOptics will enable Cisco to equip service provider customers with highly advanced 100 Gigabits per second (Gbps) transmission technology to scale their networks to meet the demands of rapidly growing Internet Protocol traffic driven by video, mobility and cloud services. According to Cisco’s Visual Networking Index research, global IP traffic will increase fivefold from 2008 to 2013 with a 40 percent […]

Pages:«1...11121314151617...27»