Chains of binary data.
5g hype buzz over sell pitch announce bull horn megaphone

Quantum computing > ion trapping [National Institute of Standards and Technology]

10 hot quantum-computing startups to watch

Well-funded young companies drawing on academics and industry veterans for leadership are tackling hardware, software, algorithms, security, analytics and more that are needed for quantum computing to become a reality in enterprises.

spinning globe smart city iot skyscrapers city scape internet digital transformation

IoT providers need to take responsibility for performance

To insure the security and privacy of Internet of Things deployments, vendors, service providers and corporate IT practitioners must assume responsibility for the integrity of their IoT networks and the data they handle.

big data / data center / server racks / storage / binary code / analytics

Named data networking: names the data instead of data locations

Will NDN kill the cloud, just like content delivery networks (CDN) kill latency?

hello my name is open source nametag

The role of open source in networking

SD-WAN vendors use open source as the foundation of their solutions and then add additional functionality over the baseline.

istock 918508394

Can Your Infrastructure Meet the Challenge of Moving from Analytics 1.0 to Analytics 2.0?

Nearly every business is moving to become analytics-driven as more and more of them seek to support their digital transformations. According to , 53% of companies were using analytics as of the fourth quarter of 2017, up from 17%...

istock 1051011724

Analytics at the Speed of Business: Beyond Self-Integration

With operating divisions and management demanding more and broader analytics to truly understand the state of the business, IT teams must provide the infrastructure that can support these much larger workloads. But IT must do so...

istock 912617272

Expanding Analytic Workloads Demand New IT Infrastructure

Is there any doubt that the use of analytics is taking off? According to Dresner Advisory Services, 53% of companies are currently using big data analytics, up from just 17% three years ago. And in a recent book published by the...

network security lock and cables

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

digital twins woman in profile ai mirror duplicate duo pair

What is a digital twin? [And how it’s changing IoT, AI and more]

Digital twins are virtual replicas of physical devices that data scientists and IT pros can use to run simulations before actual devices are built and deployed. They are also changing how technologies such as IoT, AI and analytics are...

IoT / Internet of Things / wireless network devices / mapping connections

Build security into your IoT plan or risk attack

There’s huge potential with the IoT, but security must be built into a company’s plan and not tacked on at the end.

clouded view of data center

The cloud-based provider: Not your grandfather’s MNS

Ideally, meeting the business objectives of speed, agility and cost containment boil down to two architectural approaches: the legacy telco versus the cloud-based provider.

cloud hand touch create access secure clouds reach tech job certification

Zero trust: The transition from legacy to cloud-native

To undergo the transition from legacy to cloud-native application environments you need to employ zero trust.

170227 mwc 02756

Why is Intel without a CEO after seven months?

Intel is executing fairly well for a company that doesn't have a leader, but this can’t go on forever.

hacker access to IoT / internet of things

Top 10 IoT vulnerabilities

Everyone knows security is a big issue for the Internet of Things, but what specifically should we be most afraid of? OWASP identifies the top 10 vulnerabilities.

linux basics for hackers

First step to becoming a cybersecurity pro: Linux

If you're gearing up to be a cybersecurity pro, you must have Linux skills. Linux Basics for Hackers will quickly get you up to speed.

office desk phone

Oculeus anti-fraud offering protects against telecom system abuse

Oculeus uses machine learning and behavioral analysis to hang up on expensive fraudulent calls, protecting PBX systems from attacks.

city at night, skyscrapers and light trails / New York City / NYC / Brooklyn Bridge

Did IoT cyberattacks cause NY power transformers to explode?

MadIoT attacks cause blackouts with an IoT botnet of compromised appliances.

industrial iot sensor battery

10 things the perfect IoT battery should do

Battery and power issues could slow the spread of the Internet of Things. Here’s a list of the capabilities IoT batteries need to make sure that doesn’t happen.

Load More