This ad will close in 20 seconds. Continue to site »
Suggestions for you
Browse by section
Aggregating with Apache Spark
Building an app-centric Infrastructure Performance Monitoring system
How to continuously capture, correlate and analyze system-wide heterogeneous infrastructure data so you can compare it to established response time, utilization and other metrics
Respond to ransomware in three steps: secure, assess, recover
There’s no easy button for ransomware recovery. But if you have a response plan you’ll be ready to spring into action and restore your system’s operations following an attack
7 patch management practices guaranteed to help protect your data
With these fairly simple practices in mind, you can stay on top of patch updates and safeguard your virtual data environments
Bring Your Own Authentication is upending online security practices
BYOA allows consumers and businesses to employ a variety of authentication methods that are simple to setup and convenient to use
What 5G means for your business
The 5G-powered enterprise will be less constrained by its physical location thanks to vastly improved service delivery capabilities that improve employee and customer engagement
Demystifying network analytics
Understanding how analytics should work is key to the future of network operations
What is serverless computing?
In this animation, Network World explains some of the concepts of serverless computing, and how it represents the next phase of cloud computing for Internet of Things applications and products.
How virtualizing BLE Beacons will change the indoor mobile experience
Unsupervised machine learning in the cloud eliminates site surveys and ensures consistent user experience across mobile devices and space
What is bitemporal and why should the enterprise care?
Bitemporal databases reveal what you knew and when you knew it
The granular control over Layer 2 in today’s smart switches might surprise net veterans
Smart switches have grown up to look more like the managed side of the family
Type dependency in Java, Part 1
Covariance and contravariance might seem esoteric, but you'll need these concepts more than ever as the Java language evolves. Get started with type dependency in array types, generic types, and the wildcard element.
How to calculate the true cost of migrating to the cloud
Four steps to getting it right
Serverless computing’s future is now – and why you should care
Instead of allocating virtual machines in the cloud, you upload functions and let the IaaS service provider figure out how to deploy, run and scale those functions
Maximizing use of existing cabling saves time, money and headaches
New media converters and extenders are available for most cable situations
Android Studio for beginners, Part 4: Advanced tools and plugins
Use built-in tools and third-party plugins to profile, debug, and extend your Android applications in Android Studio
Are checked exceptions good or bad?
While some programmers believe checked exceptions are a good language feature, others would disagree. In this post, Jeff introduces checked exceptions, then dives into the debate.
Recommended for You
Remote Locations Put Health Information At Risk
Communicate Simply. Migrate Confidently.
The hit list
iPhone 8 rumors: October launch date likely due to display issues, and...
Don't install the Windows 10 Creators Update on your own, Microsoft advises
12 free utilities that can give you more control over your PC
Enabling the future of connected devices
Every Company Must Behave Like a Software Company — Including Yours
Online Master of Science in Information Systems at Northwestern University