article thumbnail

Should enterprises be concerned about Intel’s crashing CPU flaw?

Network World

The warranty extension and handling RMAs [Return Material Authorizations] will be impacted here, since having RMAs from enterprise customers means higher volumes and financial impact than from just regular consumers.” Or will they be forced to do more and put themselves in a worse position that may impact them long-term?”

article thumbnail

What is SONiC and how can enterprises try the open-source NOS?

Network World

Interest in the open-source network operating system SONiC is rising as major networking vendors and start-ups look to offer resources to help enterprises give SONiC a try. A growing community of developers and users believe SONiC could change the way many large enterprises, hyperscalers and service providers run their networks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is TOGAF? An enterprise architecture methodology for business

CIO Business Intelligence

The Open Group Architecture Framework (TOGAF) is an enterprise architecture methodology that offers a high-level framework for enterprise software development. The TOGAF certification is especially useful for enterprise architects , because it’s a common methodology and framework used in the field. TOGAF definition.

article thumbnail

Security-as-a-service supplier Alert Logic started with IDS and blossomed from there

Network World

Gray Hall, CEO of Alert Logic, cut his teeth delivering enterprise-class services when he started VeriCenter, one of the earliest managed hosting companies. Hall eventually sold that company to SunGard Data Systems in 2007, and in 2009 joined Alert Logic where he has since driven revenue growth 12x.

Security 335
article thumbnail

Post-quantum encryption: Crypto flexibility will prepare firms for quantum threat, experts say

Network World

For enterprises, this means that some commonly used encryption methods, such as the RSA encryption, will be at risk sooner than they thought. Tomorrow’s quantum, today’s risks For enterprises, there are two big challenges that come with quantum computers. But most companies aren’t paying attention. That’s the safest approach.

Survey 533
article thumbnail

PCI compliance: The best defense is a great defense

CIO Business Intelligence

Cybersecurity experts at Verizon Consulting Services draw on hands-on experience in solving payment card security challenges dating back to the formation of the PCI security regulation in 2002. Success in PCI DSS compliance and enterprise-wide efforts to protect data is not determined by luck,” adds Philipsen. “It

article thumbnail

Not Just Hadoop: NoSQL in the Enterprise at Strata NYC 2012

SPF13

At the NYC Strata & Hadoop World conference I presented on ‘Not Just Hadoop: NoSQL in the Enterprise’. In this session you’ll learn about enterprise NoSQL architectures, with examples drawn from real-world deployments, as well as how to apply big data regardless of the size of your own enterprise. from Steve Francia.