Expert Analysis
Hybrid Cloud Making Headway
Gregory Ness,  VP of worldwide marketing at CloudVeloxCommentary
Technology advances such as live migration are making hybrid cloud easier for enterprises to deploy.
By Gregory Ness VP of worldwide marketing at CloudVelox,
Comment1 Comment  |  Read  |  Post a Comment
HTTP Basic Authentication Primer
Tony Fortunato, Owner, The Technology FirmEducation
In this video, Tony Fortunato discusses the simple form of HTTP authentication and shows how to verify an application is using it via Wireshark.
By Tony Fortunato Owner, The Technology Firm,
Comment2 comments  |  Read  |  Post a Comment
Reducing Risks Of New Technology Adoption
Terry Slattery, Principal Architect, NetCraftsmenCommentary
Deciding whether to adopt a new technology can be nerve-wracking. Terry Slattery outlines key steps you can take to minimize the risk.
By Terry Slattery Principal Architect, NetCraftsmen,
Comment2 comments  |  Read  |  Post a Comment
Great Gifts For Tech Lovers
Susan Fogarty, Editor in Chief
Gifts for technologists don't have to be boring. Our tech gift guide offers fun and thoughtful options for your geeky friends and relations.
By Susan Fogarty Editor in Chief,
Comment9 comments  |  Read  |  Post a Comment
It's Time To Integrate Encryption
Network Computing, ContributorCommentary
What's the first step to improving information security? Quit blaming people and focus on enabling technologies like encryption.
By Tarun Loomba, VP & GM, Computing Storage Solutions, SanDisk Inc. ,
Comment1 Comment  |  Read  |  Post a Comment
3 Ways To Optimize IT Operations
John Miecielica, Director of Product Management, TeamQuestCommentary
A truly effective IT infrastructure can become a competitive advantage. Here's how to make good IT operations even better.
By John Miecielica Director of Product Management, TeamQuest,
CommentPost a comment  |  Read  |  Post a Comment
Internet of Things: 5 Real-World Reasons It's Not Going Away
Network Computing, Contributor
Don't dismiss IoT as a technology of the future. We look beyond the hype and examine some of the ways enterprises are putting the IoT to work today.
By Joyce Chutchian, Contributor ,
Comment2 comments  |  Read  |  Post a Comment
3D XPoint: A Memory Game Changer
Jim O'Reilly, ConsultantCommentary
The new memory technology from Intel and Micron will bring massive changes to storage systems with major repercussions in the data center.
By Jim O'Reilly Consultant,
Comment3 comments  |  Read  |  Post a Comment
IoT: The Enterprise Impact
Dan Conde, Analyst, Enterprise Strategy GroupCommentary
The Internet of Things will place new pressures on many fronts for enterprise networks, including DNS and management requirements.
By Dan Conde Analyst, Enterprise Strategy Group,
Comment16 comments  |  Read  |  Post a Comment
Riverbed's Take On SD-WAN
John Herbert, Network EngineerCommentary
The software-defined WAN market is hopping. WAN optimization specialist Riverbed tackles the space from a different angle.
By John Herbert Network Engineer,
Comment2 comments  |  Read  |  Post a Comment
How To Control Shadow IT
Penny Collen, Financial Solutions Architect, Cloud Cruiser, IncCommentary
The ready availability of cloud services has eroded IT's control. Here are some ways to wrest it back.
By Penny Collen Financial Solutions Architect, Cloud Cruiser, Inc,
CommentPost a comment  |  Read  |  Post a Comment
7 Building Blocks For Enterprise IoT
Network Computing, Contributor
Behind all those flashy applications enabled by the Internet of Things is a stark reality -- enterprises must create a highly reliable and secure infrastructure before they can capitalize on it.
By Alan Joch, Contributor ,
Comment4 comments  |  Read  |  Post a Comment
DDoS Mitigation: Pay Attention To The Network
Vess Bakalov, CTO & Co-Founder, SevOneCommentary
DDoS attacks are a growing threat. Monitoring firewall and load balancing activity can help IT teams detect and mitigate DDoS attacks.
By Vess Bakalov CTO & Co-Founder, SevOne,
Comment1 Comment  |  Read  |  Post a Comment
IoT Security & Privacy: Reducing Vulnerabilities
Isaac Potoczny-Jones, Research Lead of Computer Security at GaloisCommentary
Ensuring data security and privacy in IoT networks means taking a different approach and building protection in from the start.
By Isaac Potoczny-Jones Research Lead of Computer Security at Galois,
Comment20 comments  |  Read  |  Post a Comment
8 Wireless Startups & Products Transforming Mobility
Cynthia Harvey, Contributor, NetworkComputing
The growth and development of wireless technology shows no signs of slowing down. These innovative companies and their products could revolutionize the mobile world.
By Cynthia Harvey Contributor, NetworkComputing,
CommentPost a comment  |  Read  |  Post a Comment
IT Security Horror Stories
Network Computing Editors,
In honor of Halloween and Cybersecurity Awareness Month, these tales from the IT crypt are sure to haunt your nightmares.
By Mav Turner, Director of Product Marketing and Business Strategy, Security, SolarWinds ,
Comment17 comments  |  Read  |  Post a Comment
Meet The IT Experts Behind Interop
Susan Fogarty, Editor in ChiefCommentary
Interop welcomes some of the most respected and brightest minds in the IT industry as Track Chairs for its educational program.
By Susan Fogarty Editor in Chief,
Comment1 Comment  |  Read  |  Post a Comment
Why The Business Needs SDN
Lori MacVittie, Commentary
Software-defined networking provides network programmability, which helps contain operational costs and enables business growth.
By Lori MacVittie ,
Comment5 comments  |  Read  |  Post a Comment
Who's Managing Your Cloud?
Tim Brophy, Global Cloud Architect, Dimension DataCommentary
The expectation that cloud providers will manage enterprise systems and applications is sometimes misplaced. Be sure to create effective management guidelines from the start.
By Tim Brophy Global Cloud Architect, Dimension Data,
CommentPost a comment  |  Read  |  Post a Comment
Paving The Way For SDN Interoperability
Dan Pitt, Commentary
Two new abstraction frameworks ensure interoperability between OpenFlow v1.3-enabled hardware-based switches from different vendors.
By Dan Pitt ,
Comment1 Comment  |  Read  |  Post a Comment
More Stories
Current Conversations
More Conversations
PR Newswire
White Papers
Register for Network Computing Newsletters
Current Issue
Twitter Feed