|
Video/Webcast: Citrix Systems Inc Business desktops and applications, delivered as a service, are available to users anywhere, anytime, on any device. But what about the security aspects? There may be some instances where users, shouldn't have access to sensitive applications and data. That's where Citrix provides the power of contextual access which allows IT to set policies for who can access data based on location, device and network. Watch this video and we'll show you how. Read More ▶ |
|
This compact surge protector provides 600 joules of protection, 3 outlets, and a folding wall tap plug. Two USB ports (2.1 Amp) charge personal electronics, including smartphones, digital cameras, MP3 players, and other devices. Read More ▶ | |
How VMware's vSAN provides the storage component for a hyper-converged data center. Read More ▶ | |
|
French prosecutors investigate a "planned obsolescence" complaint against printer maker Epson. A conviction could have far-reaching global ramifications. Read More ▶ | |
A guide to some essential commands that can make Linux/Unix admins' lives easier when problems crop up. Read More ▶ | |
HP's Spectre x360 will offer the CPU option of Intel's Kaby Lake G part, which has the semi-custom AMD Radeon Vega discrete GPU. We look closer at this sleek, sculpted laptop with all the fixings. Watch Now ▶ | |
Hades Canyon NUC features Intel's new Core i7 with Radeon Vega M graphics. Watch Now ▶ | |
Just leave the slim and trim Blackout Buddy in your wall socket and you'll never be in the dark. It automatically turns on when the power goes out so that you can easily locate it. Then, fold in the prongs and you've got a flashlight. Read More ▶ | |
LG's updated flagship OLED TV for 2018 packs Google Assistant in addition to HDR, HFR and Dolby Atmos support. Watch Now ▶ | |
White Paper: sqrrl Check out the popular "Huntpedia" eBook featuring all your favorite Threat Hunting people. Sqrrl has partnered with over a dozen of the leading experts on Threat Hunting and Incident Response to share their own tactics, techniques and procedures for finding evil on the wire. Read More ▶ |
Join The Network World Communities As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook ▶ Network World on LinkedIn ▶ |
SLIDESHOWS Hottest news from OpenStack Summit Read More ▶ |
Most-Read Stories |