EXPERT ANALYSIS


The Role of Security in Edge Computing

Jeremy Hess, Community Manager, Cloudify Commentary
  • A look at what's needed to mitigate IoT security threats.
    By Jeremy Hess, Community Manager, Cloudify , 1/19/2018

The Key to Container Control

Kong Yang Commentary
  • Successful container deployments involve a concept that originated from control systems theory.
    By Kong Yang , 1/18/2018

Hybrid Cloud: 4 Top Use Cases

Cynthia Harvey News
  • Interop ITX expert Camberley Bates explains which hybrid cloud deployments are most likely to succeed.
    By Cynthia Harvey , 1/17/2018

5 Ways Network Security Will Evolve in 2018

Andrew Froehlich Slideshow
  • A look at how network protection will change as cyberthreats continue to escalate.
    By Andrew Froehlich , 1/16/2018

IoT-Based DDoS Threats Loom

Andrew Hickey Commentary
  • Hot new tech, including products from CES, add to the growing risk posed by connected devices.
    By Andrew Hickey , 1/12/2018

AWS Security Tutorial: VPC Setup

Packt Publishing Commentary
  • In this excerpt from "Mastering AWS Security," learn how to configure a Virtual Private Cloud in Amazon Web...
    By Packt Publishing , 1/11/2018

How Kubernetes Speeds Innovation

Pete Johnson II, Technical Solutions Architect, Cisco Global Partner Organization Commentary
  • There's a good reason businesses of all kinds are embracing the open source container clustering technology.
    By Pete Johnson II, Technical Solutions Architect, Cisco Global Partner Organization , 1/11/2018

Cisco Adds Encrypted Traffic Analysis Function

Jai Vijayan Commentary
  • ETA is designed to help enterprises inspect encrypted traffic for malicious activity without having to...
    By Jai Vijayan , 1/10/2018

Does Hyperconverged Infrastructure Save Money?

Interop Content Team Video
  • Hyperconverged infrastructure vendors always tout the technology's cost efficiency, arguing that HCI...
    By Interop Content Team , 1/10/2018

8 Things to Know About the Container Stack

Scott McCarty, Container Strategist, Red Hat Slideshow
  • Get up to speed on the rapidly evolving world of containers.
    By Scott McCarty, Container Strategist, Red Hat , 1/10/2018

Packet Loss Vs. Latency: Analyzing the Impact

Tony Fortunato Commentary
  • In this video, learn how to use Wireshark to examine two common causes of network performance issues.
    By Tony Fortunato , 1/09/2018

Wi-Fi Alliance Strengthens Security

Marcia Savage News
  • New WPA3 capabilities include encryption on open WiFi networks.
    By Marcia Savage , 1/08/2018

8 Ways Data Center Storage Will Change in 2018

Jim O'Reilly Slideshow
  • SSD advancements will be among the major trends impacting enterprise storage this year.
    By Jim O'Reilly , 1/08/2018

Vendors Rush to Issue Security Updates for Meltdown, Spectre Flaws

Jai Vijayan News
  • Here is a list of how Microsoft, Amazon, and other vendors are responding to the CPU flaws.
    By Jai Vijayan , 1/05/2018

The Future of Seamless Hybrid Clouds

Michael Bushong Commentary
  • The multiple components that make the cloud need to come together seamlessly.
    By Michael Bushong , 1/05/2018

Cisco Keeps Lead in Enterprise Infrastructure

Network Computing Editors News

A Networking To-Do List for 2018

Dan Conde Commentary
  • Get up to speed on SD-WAN, cloud connectivity, and network automation.
    By Dan Conde , 1/04/2018

Nmap Tutorial: Common Commands

Packt Publishing Commentary
  • Learn how to use the popular network sniffer in this excerpt from "Applied Network Security."
    By Packt Publishing , 1/04/2018

QoS Best Practices for Better Bandwidth Management

Andrew Froehlich Commentary
  • Improve network performance using carefully developed quality-of-service policies.
    By Andrew Froehlich , 1/03/2018

4 Intriguing Network Trends of 2017

Terry Slattery Commentary
  • A look at four noteworthy networking trends from last year that will have long-lasting impact.
    By Terry Slattery , 1/02/2018