Wall Street was looking for earnings of at least 24 cents per share with $569.75 million in revenue.
Showing results 1 to 20 of 650
To meet the demands of Big Data, cloud applications, and the rise of Internet TV we need ever more efficient networks and Bell Labs think that converged IP and optical transport technologies can deliver the goods.
Avaya contributes to the fabric networking buzz with a new option that should support up to tens of thousands of video streams versus just hundreds previously.
A survey asking Australian security professionals to rank their security has found that most of them failed themselves on their ability to respond to and protect their own businesses.
Brocade's new CEO singled out the storage and IP networking units as major revenue contributors last quarter.
A 'super-user' root-access account has been found in a number of Barracuda security and networking products, which may allow hackers to easily access company networks, albeit if their attacks are launched from a specific set of IP addresses.
Contract win for Chinese telecom equipment vendor has sparked security concerns, but state-owned telco asserts that it followed security guidelines during the procurement process.
President Obama claims the US government invented the Internet so companies could profit from it. In fact, the US government mandated support for a rival networking system, OSI, and tried to avoid adopting the Internet's protocols
CEO of L99.com plans to sue social networking giant, claims he has video evidence of Facebook CEO attending lecture where he introduced feature.
New standard allows more globally unique IP addresses which raises privacy concerns, but increased number of addresses could make scanning by cybercriminals more difficult.
Spike in cyberattacks not spurring similar rise in cyberinsurance adoption worldwide due to issues of cost, trust and limited regulation, which reflect a still immature market especially in Asian region, observers note.
Technology remains nascent and will need to "prove itself" to financial institutions its effectiveness as an authentication tool over more mature methods such as biometrics, say observers.
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
Dubbed ACAD/Medre.A, malware targets AutoCAD software, steals and sends files to e-mail accounts located in China, says security vendor ESET, which is working with Chinese firms to prevent further harvesting of data.
Security and privacy concerns over patient data legitimate, but industry needs to adopt balanced view by defining importance of information and avoid being overly "paranoid", execs state.
Businesses need to decide if they want to devote resources to secure own infrastructure when cloud providers can offer more robust environment since their core business requires it.
Cloud-based distributed denial of service protection a lucrative business opportunity, especially in Asia where awareness of DDoS attacks and risks is growing, industry exec says.
Students ought to be taught cybersecurity knowhow as soon as tech is introduced to them, and such courses should be holistic to include ethical and societal impacts, observers say.
Hackers using improved attack techniques with distributed denial-of-service, while new technologies spurred its propagation and damage level, industry watchers point out.
Complexity arises as merchants with little knowledge of security enter market and vendors not focus on safeguarding technology, thus making standards for mobile payments a necessity, PCI exec notes.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks