Advertisement

Storage

IBM launches a software-defined storage server for AI

IBM says the ESS 3500 storage devices will improve AI training by up to 70%.


CSO slideshow - Insider Security Breaches - Flag of China, binary code

Canada bans Huawei, ZTE in 5G networks

Ottawa government’s move follows similar bans in other English-speaking countries, citing potential security risks to 5G communications networks.


White Intel logo on glass at Computex 2015

Intel to build $700M sustainability-focused R&D lab

The chipmaker has announced further investment in sustainable data center solutions, including deeper research into immersion cooling techniques.


Advertisement

network / data center

What is Nmap and why do you need it on your network?

While there are many monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.


A magnifying lens exposes an exploit amid binary code.

CISA issues emergency warning over two new VMware vulnerabilities

The U.S. Cybersecurity and Infrastructure Agency issues emergency security directive over VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973, which threat actors are likely to exploit.


money currency international denominations global currency by metamorworks getty images 1129515470

Cisco's $15B backlog: China COVID worries, impact of war in Ukraine

On Cisco's news of flat Q3 revenue the company and competitors Juniper, Arista and others take a stock hit.


cloud data warehouse

Pure Storage, Snowflake partner for on-premises data warehousing

Snowflake has always worked in the cloud, but some data warehouses are on premises, and that needed to be addressed.


3 industrial iot solar power panels energy network internet

Suprise! The internet of things doesn’t necessarily include the internet

Connected devices need a safe, reliable network of things (NoT) that ties them together, but that glue is likely IoT-specific protocols, not the internet.


Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

8 questions to ask vendors about Zero Trust Network Access (ZTNA)

Most companies understand they need to transition from perimeter-based security to a Zero Trust model. And they understand that they can’t purchase Zero Trust as an off-the-shelf product. Here are eight questions to ask prospective...


cloud sase graphic

Google Cloud boosts open-source security, simplifies zero-trust rollouts

New Google Cloud security services aim to strengthen open-source security, simplify zero-trust adoption, and improve cloud governance.


Advertisement

thousandeyes map

Weekly internet health check, US and worldwide

ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of three categories of service provider: ISP, cloud provider, UCaaS.


Email takeover  >  Puppeteer hands manipulating strings

Extracting substrings on Linux

Linux provides a nice selection of commands for pulling substrings from text, but each has its own way of working.


AMD Epyc Rome CPU

AMD makes steady gains on Intel in server chip market

Epyc server chips help AMD gain ground in data center against Intel despite major fall-off in x86 shipments.


keeping the cloud secure cloud security lock padlock private cloud

What is a private cloud?

Private clouds offer a safe haven for applications and data not suited to the public cloud for compliance, regulatory, security or other reasons.


5G mobile wireless network

5G uploads aren't fast enough for enterprise needs

A survey of wireless ISPs shows that the download speeds of their 5G services are significantly faster than 4G, but the gains in upload speed are less impressive.