Applications
Expert Analysis
Half Of Enterprises Worldwide Hit By DDoS Attacks
Kelly Jackson Higgins, Executive Editor at Dark ReadingNews
New data illustrates how distributed denial-of-service (DDoS) attacks remain a popular attack weapon -- and continue to evolve.
By Kelly Jackson Higgins Executive Editor at Dark Reading,
Comment10 comments  |  Read  |  Post a Comment
Choosing High-Capacity Drives
Jim O'Reilly, ConsultantCommentary
From hard drives for specific uses to hybrid drives and various capacity-increasing technologies, there are a lot of options. How do you decide which is best?
By Jim O'Reilly Consultant,
Comment7 comments  |  Read  |  Post a Comment
Data Encryption On The Rise
Pablo Valerio, International Business & IT ConsultantCommentary
With corporate demand for data security growing, full data encryption is becoming a default feature in the mobile space.
By Pablo Valerio International Business & IT Consultant,
Comment29 comments  |  Read  |  Post a Comment
Programming Languages And The Lord Of The Rings
Network Computing Editors,
Is there one code to rule them all? Today's IT jobs demand programming skills, but it can be tough to predict the specific languages you may need. Let The Lord of the Rings be your guide.
By Network Computing Editors ,
Comment24 comments  |  Read  |  Post a Comment
Beware IT's Villain: The 'Complexifier'
Azmi Jafarey, Chief Information Officer, IpswitchCommentary
Individuals who focus on complicating things can derail IT projects. Here's what to watch out for and how to deflect their negative effect.
By Azmi Jafarey Chief Information Officer, Ipswitch,
Comment12 comments  |  Read  |  Post a Comment
Moving Mission-Critical Applications To The Cloud
Jason Andersen, Senior Director of Product Marketing and Management, Stratus TechnologiesCommentary
Here are three steps enterprises and private clouds need to take to meet the availability requirements of critical business applications.
By Jason Andersen Senior Director of Product Marketing and Management, Stratus Technologies,
Comment8 comments  |  Read  |  Post a Comment
Community Cloud Uses NSX To Streamline Security, Cut Costs
Marcia Savage, Managing Editor, Network ComputingNews
IlliniCloud consolidates security operations and reduces networking complexity with VMware's network virtualization platform, no 'architectural duct tape' needed.
By Marcia Savage Managing Editor, Network Computing,
Comment4 comments  |  Read  |  Post a Comment
Network Priorities: Availability Tops Security
Marcia Savage, Managing Editor, Network ComputingNews
Organizations still rank availability over security in their application deployments, an F5 study finds.
By Marcia Savage Managing Editor, Network Computing,
Comment8 comments  |  Read  |  Post a Comment
What's Your Wi-Fi Strategy For 2015?
Edgar Figueroa, President and Chief Executive Officer, Wi-Fi AllianceCommentary
Enterprises that don't seize the opportunity to unlock IT value through wireless connectivity run the risk of being left behind.
By Edgar Figueroa President and Chief Executive Officer, Wi-Fi Alliance,
Comment14 comments  |  Read  |  Post a Comment
DevOps & Diverse Infrastructure
Alex Henthorn-Iwane, QualiSystems Vice President of MarketingCommentary
Don't let complex IT environments with a lot of non-virtualized infrastructure stop you from developing a DevOps practice.
By Alex Henthorn-Iwane QualiSystems Vice President of Marketing,
Comment3 comments  |  Read  |  Post a Comment
Shifting To SDN? 3 Ways It Will Affect Network Monitoring
Vess Bakalov, CTO & Co-Founder, SevOneCommentary
Software-defined networking will affect your performance monitoring and applications visibility, so plan ahead.
By Vess Bakalov CTO & Co-Founder, SevOne,
Comment5 comments  |  Read  |  Post a Comment
Privacy By Design: Protect User Data From 'Get-Go'
Henry Kenyon, Commentary
International effort seeks to bake in consumer privacy options.
By Henry Kenyon ,
CommentPost a comment  |  Read  |  Post a Comment
2015: Cloud Ramps Up For IoT
Curtis Peterson, Vice President of Operations, RingCentralCommentary
This will be the emergent year for business-to-consumer cloud services supporting the Internet of Things.
By Curtis Peterson Vice President of Operations, RingCentral,
Comment12 comments  |  Read  |  Post a Comment
Delivering Application Environments: An Evolution
Eric Schrock,  VP Engineering, DelphixCommentary
Docker is the latest technology to reduce the cost of making an application environment available to developers and other users.
By Eric Schrock VP Engineering, Delphix,
CommentPost a comment  |  Read  |  Post a Comment
Scaling Servers: A Cost Breakdown
Howard Marks, Network Computing BloggerCommentary
Software costs add up quickly in today's virtualized datacenters. Does it make more sense to buy a few big servers or a bunch of little ones? I compare the costs.
By Howard Marks Network Computing Blogger,
Comment1 Comment  |  Read  |  Post a Comment
2015's Most Ridiculous Tech Predictions
Susan Fogarty, Editor in Chief
When you've had your fill of technology predictions for 2015, take one more moment to deride the most obvious and least noteworthy of the bunch.
By Susan Fogarty Editor in Chief,
Comment46 comments  |  Read  |  Post a Comment
Cloud Migration: Discovery & Planning
Ryan Pelerin, Founding partner and COO, WSM InternationalCommentary
Migrating workloads to the cloud requires time and effort spent on up-front planning. The first part of this series explains the technical assessments and evaluations required for a successful cloud migration.
By Ryan Pelerin Founding partner and COO, WSM International,
Comment13 comments  |  Read  |  Post a Comment
Putting Erasure Codes To Work
Howard Marks, Network Computing BloggerCommentary
Erasure coding is used in scale-out object storage systems from a variety of vendors and open-source software projects. Just don't expect it to solve all your data protection problems.
By Howard Marks Network Computing Blogger,
Comment1 Comment  |  Read  |  Post a Comment
5G Will Enable Robotics In The Cloud
Antonio Manzalini, Senior Manager, Innovation, Telecom ItaliaCommentary
By 2020, 5G will permeate network infrastructures, enabling new robotic services and intelligence, as well as a densely connected digital society and economy.
By Antonio Manzalini Senior Manager, Innovation, Telecom Italia,
Comment16 comments  |  Read  |  Post a Comment
Transforming With Containers: Real-World Challenges
Scott S. Lowe, Engineering ArchitectCommentary
All the enthusiasm over Docker and containers is missing some important factors enterprises should know about. Learn from Shopify's containerization implementation.
By Scott S. Lowe Engineering Architect,
Comment5 comments  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
Slideshows
Cartoon
White Papers
Register for Network Computing Newsletters
Current Issue
Video
Twitter Feed