Everybody wants to join the DevOps movement. Everybody wants their developers and their operations people to work more closely together and take advantage of greater internal IT harmony with the result of higher agility and a faster time to market.
Regin, the latest malware threat, is also one of the more mysterious ones. When Symantec unveiled details of the new cyber espionage campaign last weekend, its researchers described it as a highly sophisticated threat with an unprecedented level of technical competence.
The Oculus Rift's official consumer release is still months away, but that hasn't stopped developers from getting excited about the virtual reality headset and forging deeply innovative software that takes full advantage of VR's breathtaking potential.
On Oct. 30, Microsoft launched Microsoft Band, its first smart wristband, which comes with a microphone for access to Microsoft's Cortana digital assistant along with a variety of fitness and notification features.
U.S. Internet users have a limited understanding of what net neutrality means and what protections are contained in company privacy policies, according to the results of a national survey by the Pew Research Center.
It's been a rough year for businesses when it comes to data breaches. A new report from ThreatTrack Security suggests that things will improve dramatically in 2015--that is, unless the survey participants are overstating the efficacy of their network defenses. It's important for you to take steps to secure your own data to make sure you're protected either way.
Most CIOs are not security experts, but in the board room they need to be. Thanks to the CSO, , they don't have to go it alone. Behind the scenes, they can help prepare the CIO, offering advice on how to interpret the company's threat levels, boiling down the most relevant information and communicating it, early and often, so the C-suite will pay attention.
NEW ORLEANS -- The U.S. has set 2023 as the target date for producing the next great leap in supercomputing, if its plans aren't thwarted by two presidential and four Congressional elections between now and then.
Walking up the gangway to board Royal Caribbean's tech-laden Quantum of the Seas, it was hard not to marvel. Across the harbor was Manhattan, and at 348 meters the new ship is almost as long as the Empire State Building is tall. But it's what the ship contains that made my inner geek salivate.
The stage is set for SDN (software-defined networking) to change the way we push data through our infrastructures, with the promises of more agile network provisioning and management, as well as more affordable network hardware. But for many, the SDN concept is still amorphous. What does SDN look like in practice?
The Docker container virtualization technology has proved to be such a hit with its users that Amazon Web Services has created a new management tool for handling large scale Docker deployments, though observers worry it could lock customers more tightly into the Amazon ecosystem.
The Docker virtualization technology has just taken another giant step forward, as developers from both Microsoft and Docker have started working on a native Docker implementation for Windows Server, which will make the increasingly popular container technology available for use in Windows shops.
When people think of network virtualization, the advantages that come to mind typically include faster provisioning of networks, easier management of networks and more efficient use of resources. But network virtualization can have another major benefit as well: security.
The Windows 9 leaks just keep on coming. This week, a barrage of screenshots and a video of the reborn Start menu were both revealed, and Friday, WinFuture posted a video showing off a newfangled virtual desktop feature currently being tested in Windows 9.