Gartner Top 10 technology trends you should know for 2017

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Oct 20, 2016
Featured Image

Your robot doctor overlords will see you now

"There is significant evidence that the majority of primary healthcare visits are of little value to the patient, and represent a massive drain on trained physician time. Physician demand is outpacing supply, begging the need for alternatives," said Laura Craft, research director at Gartner. "Technology has advanced to the point where computers have become superior to the human mind; they are more accurate and consistent, and they are better at processing all the determinants of health and well-being than even the best of doctors." Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Gartner Top 10 technology trends you should know for 2017
Flaw in Intel CPUs could help attackers defeat ASLR exploit defense
Murphy’s Law: The security version
Recruiting and retaining cybersecurity talent
Oracle fixes 100s of vulnerabilities that put enterprise data at risk
Half of American adults are in face recognition databases

White Paper: Trend Micro Incorporated

Beyond Next-Gen: Defining Future-Ready Endpoint Security

The term "next-gen" is commonly cited by technology vendors to position a product as being innovative based on new and differentiated capabilities. Notable next-gen cybersecurity products include next-gen firewalls, the state of the art of which now represents the standard, current-generation firewall technology. Read More

Thumbnail Image

Gartner Top 10 technology trends you should know for 2017

Considering how much significance Gartner is placing the future influence of artificial intelligence and algorithms, it comes as little surprise that the group is saying that technology will be one of the most strategic and potentially disruptive for 2017. At its Gartner Symposium/ITxpo, David Cearley, vice president and Gartner Fellow detailed the key technology trends for 2017 as the group sees them including how data science technologies are evolving to include advanced machine learning and artificial intelligence is helping create intelligent physical and software-based systems that are programmed to learn and adapt. Read More

Thumbnail Image

Flaw in Intel CPUs could help attackers defeat ASLR exploit defense

A feature in Intel's Haswell CPUs can be abused to reliably defeat an anti-exploitation technology that exists in all major operating systems, researchers have found. Read More

Thumbnail Image

Murphy’s Law: The security version

Murphy’s Law—anything that can go wrong, will go wrong—is alive and well in the information security world. Here are 10 variants. Read More

Recruiting and retaining cybersecurity talent

Research shows cybersecurity professionals value competitive compensation, a strong cybersecurity culture and business management commitment to cybersecurity. Read More

Thumbnail Image

Oracle fixes 100s of vulnerabilities that put enterprise data at risk

Oracle has released another large batch of patches, fixing many critical vulnerabilities in enterprise products that are used to store and work with critical business data. Read More

Thumbnail Image

Half of American adults are in face recognition databases

Half of all American adults are in a face recognition database, and law enforcement doesn't need a warrant to search the database. Read More

White Paper: Trend Micro Incorporated

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands attack surfaces. How are organizations responding? Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

Google Graveyard: What Google has killed in 2016

7 Linux command line tools you didn’t know you need Read More

Most-Read Stories

1. Gartner’s 10 strategic predictions for 2017….and beyond
2. The fix for Windows 10 needs a fix
3. Gartner Top 10 technology trends you should know for 2017
4. Patriots coach ‘done with’ Microsoft Surface
5. Ubuntu 16.10 targets hybrid cloud deployments, supports Unity 8 development
6. What’s behind Amazon, Microsoft and Google’s aggressive cloud expansions
7. 19 free cloud storage options
8. Wi-Fi troubleshooting remains a challenge for most organizations
9. Microsoft speech recognition technology now understands a conversation as well as a person
10. A dozen extensions to TCP/IP that optimize internet connections
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.