Advertisement

penguin image refers to linux

Red Hat buttresses edge features in RHEL 8.4

New features in Red Hat’s latest enterprise Linux release emphasize the company’s focus on edge computing.


IBM logo sign

IBM buys Turbonomic for AIOps, hybrid-cloud management support

By acquiring Turbonomic, IBM gains tools that manage performance of everything from applications and containers to virtualization, cloud, and on-prem compute, storage, and network resources.


Cavium ThunderX 64-bit ARM processors

Arm talks 40% and 50% better performance from 2 new server chips

Arm claims a 50% performance boost for Neoverse V1 for HPC and a gain of 40% its Neoverse N2 over the previous generation.


Advertisement

COVID-19 coronavirus morphology is layered amid statistical models and binary code.

COVID-19 upends disaster recovery planning

Post-pandemic plans for disaster recovery and business continuity will need to reflect new business realities.


cloud security expert casb binary cloud computing cloud security by metamorworks getty

SASE is coming, but adoption will be slow (especially for large enterprises)

Smaller organizations eye SASE to provide secure access to applications. Lack of maturity, existing security and digital transformation investments give large enterprises pause on SASE.


8 authentication basics password identity protected security

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.


20151027 red hat logo

Red Hat announces Red Hat Edge initiative

Red Hat has outlined how it can bundle existing and new features to better support edge networks, an effort it calls Red Hat Edge.


digital transformation / butterfly surrounded by ripples of change

Venerable Linux distro Slackware comes back to life

Slackware Linux, first released in 1993, is different from the more popular flavors, and that might be its appeal.


thousandeyes map

Weekly internet health check, US and worldwide

ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of three categories of service provider: ISP, cloud provider, UCaaS


ubuntu logo layered against background of linux penguin and abstract circuits 1200x800

Manipulating the Ubuntu dock to keep favorite apps handy

You can make accessing some applications on Ubuntu quite a bit easier by adding them to the dock. In this post, we look at how you can manipulate the dock -- adding applications, changing the size of its icons and even moving it to a...


Advertisement

Industry 4.0 / Industrial IoT / Smart Factory / automation

Siemens and Google Cloud team to deliver AI-based manufacturing solutions

Google Cloud's AI and machine-learning capabilities will be combined with Siemens' factory automation portfolio.


hack your own wi fi neon wi fi keyboard hacker

Wi-Fi in 2025: It could be watching your every move

The IEEE is working on a standard that could enable Wi-Fi to track you through walls, right down to what you’re typing on the keyboard.


drafting military for cyber security cybersecurity govenment

5G research by DARPA will lead to commercial applications

5G has a wealth of features suitable for Department of Defense uses, but its vulnerability to cyber attack calls for bulletproof security.


ai artificial intelligence ml machine learning robot touch human hand

Microsoft’s Nuance deal might trigger a new IT spending wave

In Microsoft’s hands, Nuance’s Dragon speech-to-text technology plus AI could turn Cortana into an assistant that figures out what you’re up to and delivers data you need before you ask.


security threat / hacker / attack

Organizations need to patch Pulse Secure VPNs

Vulnerabilities in Pulse Connect Secure VPN software have reportedly been exploited by attackers, some believed linked to China, to compromise networks.