|
White Paper: Recorded Future There's a lot of talk about the dark web these days, including how cyber criminals use it to spread malware, leak intellectual property, and publish user account credentials. Using open source intelligence (OSINT), our team explored the surface, deep, and dark parts of the web and investigated the links between them. Read More ▶ |
Increasing Mac numbers inspired LEGO to streamline device management Read More ▶ |
|
Microsoft released the beta of the Cognitive Toolkit with machine learning models, infrastructure and development tools, enabling customers to start building. Read More ▶ |
|
|
Apple TVs and iPads give patients more control at Jacobs Medical Center. Behind the scenes, UCSD Health Sciences relies on Jamf technology to manage and secure its interactive patient care system. Read More ▶ |
|
Home routers are flawed and vulnerable to being hacked, claims security firm ESET. Read More ▶ |
|
Amazon is trying to simplify the process of moving legacy applications to the cloud with a new service that it quietly launched this week. The aptly-named Server Migration Service is designed to help IT teams set up the incremental replication of virtual machines from their on-premises infrastructure to Amazon's cloud. Read More ▶ |
|
IBM executives touted the many uses and possibilities of its artificial-intelligence system at the opening of its World of Watson conference in Las Vegas. Read More ▶ |
|
Apple recorded its third consecutive quarter of lower revenue as it fought lower demand for the iPhone and tough competition from lower-priced competitors. Read More ▶ |
|
Several trends, including cloud computing and the Internet of Things, may have implications for how the internet and your network will evolve. Read More ▶ |
|
Under Microsoft's expanded laptop trade-in program, you can trade in old MacBooks and get credit toward buying a new Surface. Read More ▶ |
|
White Paper: Recorded Future Learn how to overcome the political inertia that often accompanies building a threat intelligence team from the ground up. This white paper details how to merge operational and strategic capabilities to automate and analyze external attack data to identify current and future security threats. Discover the six core competencies that comprise a successful program. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Celebrating 12 years of Ubuntu Read More ▶ |
Most-Read Stories |