Kubernetes 1.5 comes to Windows Server 2016

Email not displaying correctly? View it in your browser.

InfoWorld Network Report

Dec 13, 2016
Featured Image

Say good-bye to net neutrality

The Open Internet now rests in the hands of a GOP that has been openly hostile to net neutrality rules Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Kubernetes 1.5 comes to Windows Server 2016
An unpatched vulnerability exposes Netgear routers to hacking
10 essential PowerShell security scripts for Windows administrators
OpenVPN will be audited for security flaws

White Paper: Vitalyst

Executive Summary of The Collaborative Disconnect

Within "The Collaborative Disconnect: Finding the Missing Link in Constructing a Productivity Enterprise," we examine the rise of collaboration as a business ideology, what companies so often miss when pursuing it, how to rectify that disconnect, and what the benefits are of a "true" collaborative enterprise. Read More

Thumbnail Image

Kubernetes 1.5 comes to Windows Server 2016

If Docker does Windows, why can't Kubernetes, too? And so now it does -- but its uptake is tied to the Windows Server upgrade cycle Read More

Thumbnail Image

An unpatched vulnerability exposes Netgear routers to hacking

The flaw allows hackers to execute arbitrary shell commands on affected devices Read More

Thumbnail Image
INSIDER

10 essential PowerShell security scripts for Windows administrators

PowerShell is a valuable tool for automating Windows administration tasks, including laborious security chores Read More

Thumbnail Image

OpenVPN will be audited for security flaws

Cryptographer Matthew Green will analyze the popular software for flaws Read More

White Paper: Palo Alto Networks

Exploit Kits: Getting in By Any Means Necessary

Exploit kits, which first became popular in 2006, are used to automate the exploitation of vulnerabilities on victims' machines, most commonly while users are browsing the web. Over the past decade they have become an extremely popular means for criminal groups to distribute mass malware or remote access tools (RAT), because they lower the barrier to entry for attackers and can enable opportunistic attacks at scale. Read More

Get The Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content — Deep Dive PDFs and in-depth articles — available to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG Enterprise publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Network Report as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@infoworld.com.