The computer networking giant sold the buildings for $63 million to South Bay Development, a veteran real estate firm, according to documents filed on Dec. 19 with the Santa Clara County Recorder's Office. Cisco Systems sold four north San Jose office buildings with addresses of 260, 300, and 350 East Tasman Drive, and 3750 Zanker Road, as well as two parking garages in the vicinity, the county documents show.
Aging digital infrastructure equipment like routers, network switches, and network-attached storage-has long posed a silent risk to organizations. In the short term, it's cheaper and easier to just leave those boxes running in a forgotten closet. But this infrastructure may have old, insecure configurations, and legacy tech is often no longer supported by vendors for software patches and other protections.
The acquisition should help organizations build, train, and deploy specific AI models and Small Language Models (SLMs) within their own infrastructure. NeuralFabric's technology should primarily ensure that the new AI Canvas has an even more solid foundation. The future of AI models lies at least as much in small models as in large ones. To make AI truly interesting within organizations, we don't need another generic model, but rather more specialized models and SLMs.
It's finally, officially, over. On Wednesday, Nov. 12, the U.S. House of Representatives voted to end the longest (43 days) U.S. government shutdown in history by a vote of 222-to-209, echoing the verdict of the U.S. Senate that voted 60-to-40 on Monday to do the same thing. When President Trump signed off on the law late Wednesday evening, the shutdown ended.
Cisco updated its advisory regarding critical vulnerabilities in Identity Services Engine, acknowledging active exploitation. Some vulnerabilities were attempted to be exploited in the wild as of July 2025.
Cisco has released patches for a maximum-severity security flaw in Unified Communications Manager (Unified CM) and Unified Communications Manager Session Management Edition (Unified CM SME). The vulnerability, CVE-2025-20309, carries a CVSS score of 10.0, allowing an attacker to log in using the root account with static credentials that cannot be changed. Cisco advises users to upgrade to the latest version or apply the CSCwp27755 patch as there are no workarounds.