Advertisement

Tech worker

How to combat counterfeit network gear

Spotting phony gear can be tricky. Here's how to avoid buying fake gear and what to do if you discover counterfeit devices on your network.


United States Capitol Building / Congress / legislation in a digital landscape

US Congress rolls back proposal to restrict use of Chinese chips

After business groups argued that proposed legislation to curb use of Chinese-made semiconductors would hurt national security, lawmakers amended it—but a final vote and the president's approval of the proposed National Defense...


Google Sustainability

Gartner: What to do to make data centers more sustainable

Gartner says working to attain environmentally sustainable infrastructure is a marathon, not a sprint, that requires long-term goal setting.


Advertisement

Data center / enterprise networking

Ransomware attack knocks Rackspace’s Exchange servers offline

Rackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware attack.


12 killer (and free) tools for network engineers

Visibility is key to troubleshooting network woes, but getting access can be expensive. Here are 12 mostly free “killer” tools.


thousandeyes map

Weekly internet health check, US and worldwide

ThousandEyes, which tracks internet and cloud traffic, provides Network World with weekly updates on the performance of three categories of service provider: ISP, cloud provider, UCaaS.


aws logo rgb

AWS suffers outage at its US East 2 cloud region

The outage that affected the region in Ohio lasted for about 75 minutes, according to the cloud services provider.


healthcare technology / medical data

Palo Alto Networks looks to shore up healthcare IoT security

Machine-learning based visibility and monitoring are at the heart of the cybersecurity company’s new healthcare-focused, add-on application to its core firewall products.


Encryption  >  Encrypted data / hexadecimal code

Converting numbers on Linux among decimal, hexadecimal, octal, and binary

Linux provides commands for converting numbers from one base to another. Learn how to uses these commands and how to make the process easier with scripts and aliases.


arrows showing upward trend growth chart graph

How many jobs are available in technology in the US?

Tech unemployment dropped in November as companies continue adding job openings, especially in emerging fields.


Advertisement

mastodon image

Surviving a Mastodon stampede

As Elon Musk drives Twitter users to Mastodon, its underlying architecture can overload content-provider networks


post 12 image three ways that security in the azure cloud just got simpler

Researchers found security pitfalls in IBM’s cloud infrastructure

A demonstrated attack by cybersecurity researchers in IBM’s cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.


Binary chain links of data  >  Blockchain / blockchain security / linked elements

Software projects face supply chain security risk due to insecure artifact downloads via GitHub Actions

Cybersecurity researchers found risks in the GitHub Actions platform that could enable attackers to inject malicious code into software projects and initiate a supply chain attack.


cloud sase graphic

Is SASE right for your organization? 5 key questions to ask

How to make sure SASE makes sense for your organization


A spiraling clock marks the passage of time.

Linux bash tips: Many ways to loop using bash

There are many ways to loop through data on Linux using bash and many ways to generate the data to be looped through.