What’s in store for tech in 2017

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Virtualization Alert

Dec 12, 2016
Featured Image
INSIDER

8 free virtual appliances you’ll love

These prebuilt LAMP, MEAN, ELK, WordPress, and other handy stacks amount to gain without pain for developers and admins Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

What’s in store for tech in 2017
Microsoft can virtually teleport you from one place to another
7 hiring trends for 2017
(From our archives) They said the iPhone would be a flop
OpenVPN will be audited for security flaws
Juniper boosts cloud analytics, machine learning tech with AppFormix buy
Now that's a perk: Seattle tech startup offers new parents the miracle of sleep
Find a guide to easier VPN decision-making
Decentralized IT management raises concerns

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Thumbnail Image

What’s in store for tech in 2017

It's the time of year for tech predictions. We've rounded up a slew of ideas from industry watchers who track IT budgets, cybersecurity, hiring, infrastructure management, IoT, virtual reality and more. Here are their predictions, projections and prognostications. Read More

Thumbnail Image
Video

Microsoft can virtually teleport you from one place to another

Using a combination of mixed reality displays and 3D cameras, users of Microsoft's "Holoportation" technology can interact with remote participants as if they were in the same physical space. Watch Now

Thumbnail Image

7 hiring trends for 2017

Hiring is a challenge for CIOs, and it won’t get much easier in the coming year, particularly for IT departments that are trying to fill key security and networking roles. Read More

Thumbnail Image

(From our archives) They said the iPhone would be a flop

Pundits who got it wrong explain why ... or deny that they did Read More

Thumbnail Image

OpenVPN will be audited for security flaws

The next major version of OpenVPN, one of the most widely used virtual private networking technologies, will be audited by a well known cryptography expert. Read More

Thumbnail Image

Juniper boosts cloud analytics, machine learning tech with AppFormix buy

Looking to bolster its cloud analytics and machine learning technologies, Juniper today announced its intention to buy startup AppFormix for an undisclosed amount. AppFormix brings streaming analytics and machine learning technologies to Juniper that are tailored for managing operations of large OpenStack and Kubernetes-based Hybrid clouds and Network Function Virtualization (NFV)/Telco clouds, wrote Ankur Singla, Juniper’s Vice President, Office of the CTO in a blog about the acquisition Read More

Thumbnail Image

Now that's a perk: Seattle tech startup offers new parents the miracle of sleep

Parental perks are aimed at attracting more diverse workforce Read More

Find a guide to easier VPN decision-making

Deciding on a new or updated virtual private network (VPN) solution can be intimidating, but it shouldn’t be. Businesses need fast decisions on network infrastructure, but making a bet in the midst of rapid technology advances can have a paralyzing impact. Read More

Thumbnail Image

Decentralized IT management raises concerns

IT isn't happy about the shift to decentralized IT management, so VMware tries to provide the best of both worlds: developer flexibility and centralized IT. Read More

Video/Webcast: Keeper Security

How to Protect Your SMB Against Cyber Attacks

Passwords are the most basic form of protection, yet they are also the most susceptible to outside hacking because of poor employee practices. Whether employees write them down, simplify them, or neglect to change them, passwords are an easy target for outside hacking. This video discusses password best practices, and what an companies can do to manage their employees password. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

What’s in store for tech in 2017

20 years ago: Hot sci/tech images from 1996 Read More

Most-Read Stories

1. AT&T to cough up $88M for ‘cramming’ mobile customer bills
2. Say goodbye to MS-DOS command prompt
3. Cisco whacks its Secure Access Control System
4. Apache Zeppelin open-source analytics startup reveals new name, fresh funding
5. Cisco Talos: Zeus spawn “Floki bot” malware gaining use cyber underworld notoriety
6. 19 free cloud storage options
7. Just one autonomous car will use 4,000 GB of data/day
8. 10 reasons to divorce the cloud
9. 10 most useful Slack bots
10. 7 free tools every network needs
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Virtualization Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.