|
Video/Webcast: Veritas If your organization uses native database tools, like RMAN, to backup your Oracle databases, you're not alone (82% of Oracle DBs are primarily managed by DBAs). While these tools are simple and convenient, they can create management, scheduling, and governance challenges that put your database team at odds with the backup team and with corporate compliance. Read More ▶ |
Windows Ink, Cortana, and Microsoft Edge: Here's why you'll want Microsoft's Windows 10 Anniversary Update. Watch Now ▶ |
|
AMD is rebooting its server business around chips with the Zen CPU, which will also be used in PCs. AMD is getting creative with Zen and considering merging the CPU with a high-performance GPU to create a mega-chip for high-performance tasks. Read More ▶ |
|
Microsoft will preview a new service today that lets enterprises mine data that Windows collects to accelerate adoption of Windows 10. Read More ▶ |
|
|
By 2021, the historical meaning of Moore's Law may come to an end. Read More ▶ |
|
Our roundup of intriguing new products from companies such as Acronis Networks and Algosec. Read More ▶ |
|
Dell has patched several critical flaws in its central management system for SonicWALL enterprise security appliances, such as firewalls and VPN gateways. Read More ▶ |
|
Hard on the heels of a similar pitch from AT&T, Verizon this morning is taking the wraps off a lineup of Virtual Network Services (VNS) that it bills as a natural extension of data-center virtualization that promises enterprise WAN customers fast, flexible provisioning as well as cost savings. Read More ▶ |
|
Conscientious sysadmins face a dilemma on December 31, when a new leap second will threaten the stability of computer systems and networks. Read More ▶ |
|
a report out this week from the Department of Justice’s Office of the Inspector General which found that while the FBI has an annual process, known as Threat Review and Prioritization (TRP), to identify the most severe and substantial threats and direct resources to them, the process employs subjective terminology that is open to interpretation, and as such does not prioritize cyber threats in an objective, data-driven, reproducible, and auditable manner. Read More ▶ |
|
White Paper: Endgame Learn the process for automating the hunt for threats, including how to deploy a continuous threat-hunting process. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS 2016 technology industry graveyard Read More ▶ |
Most-Read Stories |