System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Infrastructure
27 Mar 2017 Top Ten Articles for last few Issues [61651]
Vol 229 Issues 1, 2 and 3; Vol 228 Issues 1, 2, 3 and 4; Vol 227 Issue 4

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • Darpa's Latest Idea Could Put Today's Turing-Era Computers At Risk
  • Has The Holy Grail Of Batteries Finally Arrived?
  • Everything You Wanted To Know About Google Data Centers
  • IoT Edge Computing Presents Next Big Challenge For Cloud
  • Towards A Lip-Reading Computer
  • Desktop Linux The Best It'S Ever Been-And Keeps Getting Better
  • 5 Habits Of Highly Successful CTOs
  • Augmented And Virtual Reality To See Aggressive Growth By 2021
  • Execs: Companies Too Slow To Adopt Emerging Tech
  • Raspberry Pi Becomes Third Best-Selling General Purpose Computer Of All Time

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

26 Mar 2017 IoT And The Resurgence Of Public Key Infrastructure [61664]
Help Net Security, March 17th, 2017

"With the digital revolution in full swing, security methods and models need to be re-evaluated to better address both the changing nature of enterprise architectures and processes," writes Josh Jabs in Help Net Security. "While the proliferation of mobile devices and analytics has vastly improved user experience over the past several years, the challenges of user-to-things security and securing a greatly expanded edge architecture remain unsolved.

One approach is making its resurgence as a result of the IoT and cloud - public key infrastructure (PKI) - and has the potential to close these security gaps for today's digital businesses..."
(Get More Information . .) open to premium members only

24 Mar 2017 SIX Leverages IBM Watson for Cognitive Security Operations Center [61791]
IBM, March 24th, 2017

New Partnership to build a next-generation Security Operations Center to strengthen cyber defence and offer customers security services for compliance with Swiss privacy and financial market regulations

IBM Security and SIX, the operator of the infrastructure underpinning the Swiss financial sector, announced plans to leverage IBM Watson for Cyber Security in a new cognitive Security Operations Center (SOC). The new facility will be housed at SIX's offices in Switzerland to provide localized cyber security services tailored to needs of the region.
(Get More Information . .) open to premium members only

24 Mar 2017 Continuing Converged Leadership and Strong Growth in HCI [61789]
EMC, March 24th, 2017

SVP & Chief Technology Officer, Converged Platforms and Solutions Division at Dell EMC

IDC's 4Q2016 Worldwide Quarterly Converged Systems Tracker has once again recognized Dell Technologies as #1 in the total converged systems market in terms of revenue, units shipped and new capacity shipments. In particular, Dell EMC leads the Integrated Infrastructure Systems segment with a 73% market share up six percentage points from the 67% in 4Q15. This IDC Tracker also confirmed our phenomenal growth in hyper-converged systems revenue, which was up 206% (Y/Y) during the fourth quarter of 2016. According to IDC, Dell Technologies captured 26.9% share of the overall Converged Systems (CS) revenue for the fourth quarter of 2016 and 28.4% share of the calendar year revenue. We are clearly a leader in this market.
(Get More Information . .) open to premium members only

24 Mar 2017 7 Best Practices For Securing Your Cloud Service [61720]
Network World, March 24th, 2017

"How to securely leverage the benefits of the cloud by using its strengths to overcome issues that have traditionally been labeled as weaknesses...

As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.

Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->