Putting to rest 3 persistent SDN myths
Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.
Читать дальше...
Although vendor-written, this contributed piece does not promote a product or service and has been edited and approved by Network World editors.
Читать дальше...
The U.S. is aggressively targeting ISIS in cyberspace, attempting to halt the group's ability to communicate electronically, Secretary of Defense Ash Carter said Thursday.
Читать дальше...
Plonked is hyping itself as "the NEW Google," a fresh search engine that pledges to make it easier for you to find out stuff about companies in case you want to work for them, buy them, get sales leads or just plain know more about them.
Читать дальше...
There's never any shortage of buzzwords in the IT world, but when it comes to AI, they can be hard to tell apart. There's artificial intelligence, but then there's also machine intelligence. There's machine learning, but there's also deep learning. What's the difference? Here are five things you need to understand.
Читать дальше...
US Secretary of Defense Ashton Carter spoke last at the RSA conference after NSA Director Rogers and Attorney General Lynch because he was prepared for a more substantive dialog with the RSA Conference audience. He had real news to deliver, his opinion to share about encryption that is central to the FBI and Apple iPhone encryption dispute and innovation programs to pitch.
Читать дальше...
In one case pirates – actual pirates – boarded cargo ships armed with a list of which shipping containers contained jewelry and went straight to them, stole the gems and left.
Читать дальше...
‘Private cloud’ is a term people throw around a lot – but what is it exactly?
Читать дальше...
What if everything you thought you knew about improving your IT workers' performance was wrong? Chances are, even if you're using 360-degree performance assessments and gauging performance against core competencies, you're focusing on the negatives instead of the positives, you're not seeing the performance gains you'd expect.
Читать дальше...
The next time you see a billboard on the side of the road, it may also be scanning you.
Cisco Systems has released software updates for its Nexus 3000 and 3500 switches in order to remove a default administrative account with static credentials that could allow remote attackers to compromise devices.
Читать дальше...
Russia isn't known as the PC capital of the world, but when a new homegrown machine comes along it's sometimes curious enough to get our attention.
Читать дальше...
Enterprise Connect, the industries largest business communications show, gets underway next week in Orlando. While the themes for the event have changed over the years, one that has not in over a decade is how to get Microsoft and Cisco UC solutions to work better together.
Читать дальше...
IBM has sued online deals marketplace Groupon for infringing four of its patents, including two that emerged from Prodigy, the online service launched by IBM and partners ahead of the World Wide Web.
Читать дальше...
Long ago, in a IT operations model far, far away, businesses built their data centers. Rows and rows of server racks humming away in closets tangled with cables -- that was IT’s lifeblood. It was a time when virtualization meant that thing a couple of gung-ho admins toyed with on an old HP DL360 server destined for the garbage bin.
Читать дальше...
With data breaches grabbing headlines nearly every week, threat intelligence is shaping up as the next big thing in information security. That, of course, means there’s more hype and confusion to sift through.
Читать дальше...
Thanks to Disney's IT layoff, the Florida primary -- scheduled for March 15 -- might be the most telling on the H-1B visa issue.
Читать дальше...
What's most important about your smartphone? Something you don't actually see — the network you use to connect to the Internet, find and use apps, get information and more. So for the third year in a row we set out to discover which mobile service provider gives you the most comprehensive and reliable data network coverage, the fastest upload and download speeds, and the most bang for the buck.
Читать дальше...
As little as four years ago, only about a third of companies considered cybersecurity when planning a merger. Today, that percentage has flipped.
Читать дальше...
Heavily regulated industries with lots of regulation compliance rules, such as healthcare and finance services, have found the cloud to be a bridge too far, since they had such strict controls over data, where it resided and how it was protected.
Читать дальше...
The use of unsanctioned social collaboration tools in the enterprise can be a real challenge for any IT organization, but they also often spark productivity and help teams focus. In fact, many CIOs and IT professionals say workers who use apps such as Yammer and Slack can both raise the threat associated with shadow IT and drive productivity gains. Companies must understand the unique strengths and weaknesses of popular social tools if they want to see real value, according to business leaders.
Читать дальше...
Cisco Systems is buying in some chip expertise that could help it in the datacenter.
Читать дальше...
The Internet of Things has made many enterprises more efficient. This year it will start making them more competitive.
Читать дальше...
In a bid to expand the market they address in India, Uber Technologies and arch Indian rival Ola have launched on the same day pilots of a smartphone app-based service for booking motorcycle rides.
Читать дальше...
In an effort to save time, customers are increasingly awarding business straight to Cisco without going through months-long “bake-offs” to evaluate solutions from various vendors, Cisco CEO Chuck Robbins said this week during the company’s reseller partner conference. These customers would rather focus on company business operations than spend as long as three months evaluating trials of different vendor proposals to fulfill their IT requirements, he says.
Читать дальше...
For the third time in less than a year, security researchers have found a method to attack encrypted Web communications, a direct result of weaknesses that were mandated two decades ago by the U.S. government.
Читать дальше...Мы не навязываем Вам своё видение, мы даём Вам объективный срез событий дня без цензуры и без купюр. Новости, какие они есть — онлайн (с поминутным архивом по всем городам и регионам России, Украины, Белоруссии и Абхазии).
123ru.net — живые новости в прямом эфире!
В любую минуту Вы можете добавить свою новость мгновенно — здесь.