Computerworld

IDG’s Top Enterprise Stories

March 18, 2019

Image: 3 ways to monitor encrypted network traffic for malicious activity

3 ways to monitor encrypted network traffic for malicious activity

Ubiquitous encryption of network traffic prevents you from performing deep packet inspection, but you can still detect and prevent a lot of attacks. Read more ▶

Your Must-Read Stories

•

What customer-centric IT really looks like

•

How to use Glimpse in ASP.Net Core

•

Windows 10 quick tips: Get the most out of Cortana

•

Review: The best frameworks for machine learning and deep learning

•

Ransomware attack drives city to seek greater network visibility

•

Palm Beach County speeds court filings with AI

•

Jenkins tries to reinvent itself as cloud-native for Kubernetes

eGuide: APC by Schneider

Edge Computing

In the era of the Internet of Things, edge computing is fast becoming a necessity. Here’s what you need to know as you consider bringing it into your organization. Read more ▶

Image: What customer-centric IT really looks like

What customer-centric IT really looks like

CIOs are making cultural and organizational changes to forge a direct connection between IT and end customers as part of their charter to boost digital innovation. Read more ▶

Image: Learn how to get certified in Microsoft Azure for just $29

FROM OUR BUSINESS PARTNERS

Learn how to get certified in Microsoft Azure for just $29

Learn about cloud technology and how to deploy a cloud environment using Azure Read more ▶

Image: How to use Glimpse in ASP.Net Core

How to use Glimpse in ASP.Net Core

Take advantage of the Glimpse debugging and diagnostics tool to gain insight into the performance of your ASP.Net Core web application Read more ▶

 
 
Image: Windows 10 quick tips: Get the most out of Cortana

Windows 10 quick tips: Get the most out of Cortana

Microsoft's digital assistant Cortana can make your life easier and more efficient — if you know how to really take advantage of it. Read more ▶

Image: Review: The best frameworks for machine learning and deep learning

Review: The best frameworks for machine learning and deep learning

TensorFlow, Spark MLlib, Scikit-learn, MXNet, Microsoft Cognitive Toolkit, and Caffe do the math Read more ▶

Image: Ransomware attack drives city to seek greater network visibility

Ransomware attack drives city to seek greater network visibility

After being hit with the Cryptolocker ransomware, the City of Westland realized it needed more insight into network traffic, not just at the perimeter. Read more ▶

Image: Palm Beach County speeds court filings with AI

Palm Beach County speeds court filings with AI

With five robots handling basic docketing processes, the county is enhancing efficiency, converting skeptics and escalating staff to higher-value work — and higher pay. Read more ▶

Image: Jenkins tries to reinvent itself as cloud-native for Kubernetes

Jenkins tries to reinvent itself as cloud-native for Kubernetes

The Jenkins X project tries to modernize the CI/CD platform that has fallen on hard times Read more ▶

White Paper: ePlus and Juniper

EX4200 ETHERNET SWITCH with Virtual Chassis Technology

High-performance businesses demand high-performance networking solutions. The Juniper Networks EX2200 Ethernet Switch offers an economical, entry-level, stand-alone solution for access-layer deployments in branch and remote offices, as well as campus networks. Read more ▶

Email not displaying correctly? View it in your browser
You are currently subscribed to IDG's Top Enterprise Stories as newsletter@newslettercollector.com.
Learn more about
Insider
Copyright © 2019 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701
Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.