IBM sales jump shows the mainframe is not dead

The company's third quarter financial report reveals a strong showing for mainframes as well as hybrid infrastructure, as total quarterly revenue hits $14 billion. | Continue reading


@networkworld.com | 1 year ago

Rocky Linux 9 arrives with Peridot

New to Rocky Linux 9 is Peridot, a tool that makes it easy for anyone to replicate and extend Rocky Linux. | Continue reading


@networkworld.com | 1 year ago

Clement Lefebvre: The Man Behind Linux Mint (2013)

Continue reading


@networkworld.com | 1 year ago

Microsoft Shifts SONiC Development to the Linux Foundation

With the Linux Foundation in charge, Software for Open Networking in the Cloud could attract stronger enterprise interest for the open-source NOS. | Continue reading


@networkworld.com | 1 year ago

Is SD-WAN out to kill MPLS?

SD-WAN is something everyone's talking about but is it better than MPLS? My answer is yes... and it's easier to explain than baseball. | Continue reading


@networkworld.com | 2 years ago

A telecom investment in North Korea went horribly wrong

An Egyptian company that launched North Korea's first 3G cellular network and built it up to 3 million subscribers says it's effectively lost control of the operator despite owning a majority stake. | Continue reading


@networkworld.com | 2 years ago

The Many Faces of Awk

The awk command provides a lot more than simply selecting fields from input strings, including pulling out columns of data, printing simple text evaluating content – even doing math. | Continue reading


@networkworld.com | 2 years ago

Odd Linux Commands (2016)

Nine commands that do some very unusual things on Linux systems. Some could actually prove useful. | Continue reading


@networkworld.com | 2 years ago

Q&A with inventor of Microsoft PowerShell (2016)

The creator of Microsoft's recently open-sourced scripting and configuration framework PowerShell, Jeffrey Snover, sat down with Network World at LinuxCon North America 2016. | Continue reading


@networkworld.com | 2 years ago

Random Identity Generation in Linux

Generating a list of names, addresses and phone numbers can be very easy when you know what tools to use. Let's take a look at the rig command. | Continue reading


@networkworld.com | 2 years ago

What Is Hyperconvergence? (2019)

Hyperconvergence aims to simplify data center operations by combining compute, storage and networking in a single system. Enterprises can choose an integrated HCI appliance from a single vendor, or hardware-agnostic hyperconvergence software. | Continue reading


@networkworld.com | 3 years ago

Is quantum computing ready to leap into the real world?

While tech industry heavyweights strive for quantum supremacy, IDC’s latest research reveals the current state of quantum computing and explains why real-world applications are only a qubit away. | Continue reading


@networkworld.com | 3 years ago

Why computer science students cheat (2010)

Enrollment in undergraduate computer science courses is at an all-time high at colleges nationwide. But this trend that's been hailed by the U.S. tech industry has a dark side: a disproportionate number of students taking these courses are caught cheating. | Continue reading


@networkworld.com | 3 years ago

Cisco spotlights new IT roles you've never heard of

A Cisco report on IT trends says new jobs to address changing IT needs include business translator, network guardian and network detective. | Continue reading


@networkworld.com | 3 years ago

Can Fujitsu beat Nvidia in the HPC race?

The Japanese electronics giant is making bold performance claims about its supercomputer processor. | Continue reading


@networkworld.com | 4 years ago

Marvell announces 96-core ThunderX3 Arm server processor

New design clobbers Intel and AMD in core and thread count, but the proof will be in the independent benchmarks. | Continue reading


@networkworld.com | 4 years ago

How AppArmor can protect your Linux system

AppArmor is a Linux-kernel security module that offers unique benefits. | Continue reading


@networkworld.com | 4 years ago

Ampere preps an 80-core Arm processor for the cloud

A new Ampere chip due out next year is single-threaded to avoid the 'noisy neighbor' problem that can impede customer workloads in multi-tenant cloud-provider networks. | Continue reading


@networkworld.com | 4 years ago

How to Decommission a Data Center

Decommissioning a data center is lot more complicated than shutting down servers and switches. Here’s what you should keep in mind. | Continue reading


@networkworld.com | 4 years ago

Firewalls Not Architected for IIoT

Firewalls have been the de facto standard for securing internal devices, but the industrial internet of things (IIoT) will change that. Segmentation is the better option in those scenarios. | Continue reading


@networkworld.com | 4 years ago

Small but significant change in how Linux systems work with runtime data

There's been a small but significant change in how Linux systems work with respect to runtime data. Here's an overview of the change to /run. | Continue reading


@networkworld.com | 4 years ago

The CIA, NSA and Pokémon Go

Before playing Pokémon Go, consider the data the game has access to, the history of Niantic Labs and its connection with the CIA and the NSA. | Continue reading


@networkworld.com | 4 years ago

Xilinx launches new FPGA cards that can match GPU performance

Xilinx unveiled a new FPGA card, the Alveo U50, that it says can match the performance of a GPU in areas of artificial intelligence (AI) and machine learning. | Continue reading


@networkworld.com | 4 years ago

Public internet should be all software-defined

Having a programmable public internet will correct inefficiencies in the current system, engineers at NOIA say. | Continue reading


@networkworld.com | 4 years ago

What programming languages rule the Internet of Things?

Does the IoT run on the same programming languages that drive the rest of the technology world? Yes, mostly. | Continue reading


@networkworld.com | 4 years ago

Host Identity Protocol Makes Micro-Segmentation Easier

Tempered Networks’ IDN platform uses the Host Identity Protocol to partition and isolate the network into trusted microsegments, providing an easy and cost-effective way to secure the network. | Continue reading


@networkworld.com | 4 years ago

The long, slow death of commercial Unix

Unix was the standard for mission-critical computing. Now it’s clinging for life. How will it end? | Continue reading


@networkworld.com | 4 years ago

Startups introduce new liquid cooling designs

One company sees an opportunity for the black art that is immersion cooling, while the other has a twist on regular liquid cooling. | Continue reading


@networkworld.com | 5 years ago

Quantum computing will break your encryption in a few years

Quantum technology’s set to make public-key infrastructure obsolete before too long, but it might also keep your data secure. | Continue reading


@networkworld.com | 5 years ago

Quantum-embedded chips could secure IoT

An unclonable, quantum physics-driven microprocessor might be the solution to securing the Internet of Things. | Continue reading


@networkworld.com | 5 years ago

Can TLS 1.3 and DNSSEC make your network blind?

DNS & ISN encryption are likely to present numerous problems to the network operations, optimization and SD-WAN vendors. | Continue reading


@networkworld.com | 5 years ago

Did IoT cyberattacks cause NY power transformers to explode?

MadIoT attacks cause blackouts with an IoT botnet of compromised appliances. | Continue reading


@networkworld.com | 5 years ago

ICANN housecleaning will revoke old DNS security key this week

ICANN will complete the switchover this week to a new internet security key that protects DNS. The old Root Key Signing Key will be decomissioned Jan. 10. | Continue reading


@networkworld.com | 5 years ago

What to Expect of Linux in 2019

Faster, more versatile and secure, Linux gets better every year. Let's take a look at some of the highlights expected in 2019. | Continue reading


@networkworld.com | 5 years ago

Chip-cooling breakthrough will reduce data-center power costs

A new microprocessor manufacturing technique could keep future electronics 18 degrees cooler, providing huge efficiency gains for data centers. | Continue reading


@networkworld.com | 5 years ago

Earliest known photos of an Apple iPad prototype

Well before the iPhone, and going back all the way to the early 2000s, Apple had been working on tablet prototypes that would eventually form the groundwork for the original iPad | Continue reading


@networkworld.com | 5 years ago

Which cloud performs better, AWS, Azure or Google?

Performance varies widely among the big three cloud service providers – AWS, Google Cloud and Microsoft Azure – and their networks are a big reason why, a ThousandEyes study reveals. | Continue reading


@networkworld.com | 5 years ago

Optical networking breakthrough will run networks 100x faster

Forming light waves into a spiral pattern allows multiplexing within fiber cable, adding throughput to traditional networks, researchers say. | Continue reading


@networkworld.com | 5 years ago

Wave energy to power undersea data centers

Ocean Energy's ability to create electricity from seawater may prove to be the most efficient and eco-friendly way to bring edge computing to coastal population centers. | Continue reading


@networkworld.com | 5 years ago

ICANN’s internet DNS security upgrade apparently goes off without a glitch

ICANN's internet DNS security upgrade on Oct. 11 went smoothly. The move from 2010 KSK to the 2017 KSK will tighten security for the internet’s address book. | Continue reading


@networkworld.com | 5 years ago

IP Was Middle School, Named Data Networking Is College

Much of the Named Data Networking (NDN) project codebase is still at the Version zero-dot-something level. But things are nevertheless starting to get real for this architecture designed to blast past today’s host-based and point-to-point Internet scheme to one more suited for hu … | Continue reading


@networkworld.com | 5 years ago

Linux kernel 4.18: Better security, leaner code – Network World

The latest version of the Linux kernel cleans out nearly 100K lines of code, adds file encryption and the Berkeley Packet Filter, plus makes a nod to gamers and mobile devices. | Continue reading


@networkworld.com | 5 years ago

Introduction to Snaps – A Universal Linux Package Manager

Learn what "snaps" are and why are they making the development and installation of Linux applications so trouble-free. | Continue reading


@networkworld.com | 5 years ago

How to use the gpg command to encrypt Linux files

Encryption commands such as gpg can be used to secure your most sensitive files on Linux systems. | Continue reading


@networkworld.com | 5 years ago

Solving for serverless: How do you manage something that’s not there?

Truly ephemeral workloads make for challenges you can see. | Continue reading


@networkworld.com | 5 years ago

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks? | Continue reading


@networkworld.com | 5 years ago

The aftermath of the Gentoo GitHub hack

A password guess and five days offline have left not only Gentoo's GitHub admins, but all of us, with some things to think about. | Continue reading


@networkworld.com | 5 years ago

Linux control sequence tricks

There are a lot of control sequences available on Linux systems -- maybe even some you've never used. | Continue reading


@networkworld.com | 5 years ago