20 Most Popular TechRepublic Articles in 2023
Tech Republic Security
DECEMBER 22, 2023
Here's a list of the 20 most popular articles published by TechRepublic in 2023. Read articles about ChatGPT, Google Bard, Windows 11 and more
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Tech Republic Security
DECEMBER 22, 2023
Here's a list of the 20 most popular articles published by TechRepublic in 2023. Read articles about ChatGPT, Google Bard, Windows 11 and more
Network World
MAY 18, 2023
The IBM Hybrid Cloud Mesh is a SaaS service that implements a virtualized Layer 3-7 environment to rapidly enable secure connectivity between users, applications, and data distributed across multiple locations and environments, according to Andrew Coward, general manager of IBM’s software defined networking group.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Network World
FEBRUARY 4, 2021
Cisco AppDynamics is making it easier for customers to integrate security features with application development to help customers detect threats, identify non-standard application behavior, and block attacks. Read more: How AI can create self-driving data centers To read this article in full, please click here
Network World
JUNE 6, 2023
Cisco this week took the wraps off a security service edge (SSE) offering that aims to help enterprises securely connect growing edge resources, including cloud, private and SAAS applications. Along with the SSE package, the vendor made two additional application security-related announcements at its Cisco Live! customer event.
Network World
APRIL 12, 2022
Cisco has tweaked its flagship SD-WAN software package to increase customer application flexibility and improve visibility into the performance of distributed resources. which adds support for new business and customized cloud applications, analytics and security features. To read this article in full, please click here
Network World
JULY 27, 2021
IBM continues to fine-tune its mainframe to keep it attractive to enterprise users interested in keeping the Big Iron in their cloud and AI-application development plans. According to IBM, applications are at the heart of transactional and batch workloads running on z/OS. To read this article in full, please click here
Network World
AUGUST 3, 2021
Juniper Networks continues to grow its enterprise cloud- security family with a new product that promises to protect application workloads in any cloud or on-premises environment. To read this article in full, please click here Backup lessons from a cloud-storage disaster. Backup lessons from a cloud-storage disaster.
IT Toolbox
FEBRUARY 9, 2024
Computer science deals with the theory, design, development, and application of computational systems and software. This article describes what computer science is, its history, and its importance. Definition, History, Applications, and Importance appeared first on Spiceworks. The post What Is Computer Science?
CIO Business Intelligence
FEBRUARY 27, 2025
Questions about AI models that CIOs and CISOs should be asking CIOs and CISOs play pivotal roles in maximizing the benefits of generative AI and agentic AI while keeping applications, usage, and data secure. Data in BMC Helix AI applications remain within the customers contracted regions. What are the data residency considerations?
Network World
JUNE 16, 2022
Cisco is taking aim at better controlling the performance and development of core applications with a new AppDynamics cloud service and open-source development tools. AppDynamics Cloud is a cloud-native service designed to let enterprises observe applications and take action to remediate performance problems. . [
Network World
MARCH 8, 2020
Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away.
Network World
MARCH 6, 2025
All the major players Nvidia, Supermicro, Google, Asus, Dell, Intel, HPE as well as smaller vendors are offering purpose-built AI hardware, according to a recent Network World article. You cant simply concentrate the power into a particular zone in the data center and say here is where Im going to run all my AI applications.
Network World
FEBRUARY 21, 2025
However, red flags are being raised in the United Kingdom, and those concerns that have application in the US as well and elsewhere. Considering the numbers presented in the article, I feel the industry needs a benchmark, like how much water is required per unit device/rack/square foot area.
Network World
DECEMBER 16, 2022
Network teams are investing in technologies such as SD-WAN and SASE , expanding automation initiatives, and focusing on skills development as more workloads and applications span cloud environments. To read this article in full, please click here and a Network World columnist.
Network World
JULY 27, 2022
Specifically, the z16 supports the Crypto Express8S adapter to deliver quantum-safe APIs that will let enterprises start developing quantum-safe cryptography along with classical cryptography and to modernize existing applications and build new applications, IBM stated. To read this article in full, please click here
Network World
OCTOBER 18, 2023
To read this article in full, please click here “This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight,” said Leigh McMullen, distinguished vice president analyst at Gartner.
Anoop
MARCH 11, 2025
Hello - Here is the new HTMD Blog Article for you. Subscribe to YouTube Channel [link] and LinkedIn page for latest updates [link] The post Best way to Install CutePDF Writer using Intune Application Model appeared first on HTMD Community Modern Device Management News & Guides by Anoop C Nair. Enjoy reading it.
Information Week
DECEMBER 6, 2021
(SPONSORED ARTICLE) Accelerating application delivery is an aspirational aim for the transformative IT organization. So, can the enterprise deliver value as it undergoes ongoing evolution?
Network World
MAY 15, 2023
Cisco is more tightly integrating its network- and application-intelligence tools in an effort to help customers quickly diagnose and remediate performance problems. To read this article in full, please click here
Network World
DECEMBER 19, 2024
Beyond policing, this technology holds potential applications in other public safety domains such as traffic management, fisheries supervision, and forestry oversight. This article only scratches the surface of the profound impact the Digital Policeman project is making. Why read the full spotlight paper?
Network World
NOVEMBER 16, 2021
Palo Alto Networks has bolstered its security software to better protect enterprise Software-as-a-Service (SaaS) applications. which includes the ability to code security directly into SaaS applications. To read this article in full, please click here
CIO Business Intelligence
NOVEMBER 25, 2024
Publishing job ads enables companies to collect applications and information about potential candidates to have a pool on hand to quickly respond to future employment needs. Companies can therefore publish ads en masse, regardless of their actual recruitment needs.
Network World
FEBRUARY 17, 2020
Not only can automation help address these problems, they can also improve overall application-response time by anticipating and addressing looming congestion. To read this article in full, please click here
Network World
MAY 3, 2023
Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN. AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications.
Network World
FEBRUARY 24, 2021
Cisco has issued three security advisories rated “critical” for some of its high-end software systems—two aimed at its Application Services Engine (ASE) implementation and one at the NX-OS operating system. To read this article in full, please click here
CIO Business Intelligence
JANUARY 16, 2025
Later, as an enterprise architect in consumer-packaged goods, I could no longer realistically contemplate a world where IT could execute mass application portfolio migrations from data centers to cloud and SaaS-based applications and survive the cost, risk and time-to-market implications.
Network World
JUNE 30, 2022
IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications. Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox.
CIO Business Intelligence
JANUARY 23, 2025
In this first of a short series of articles, we offer a way to inspire individuals to take a growth mindset toward the opportunity genAI presents. This story demonstrates two broadly applicable principles. Making the most of any new technology depends on shifting the mindset of people and retooling processes. (We
Network World
MARCH 18, 2021
With a goal of making distributed applications more secure, VMware has announced plans to buy security vendor Mesh7 for an undisclosed amount. To read this article in full, please click here
Network World
OCTOBER 11, 2022
The new offerings announced at Google Cloud Next also include firewall and web application-protection options aimed at advancing existing cloud connectivity and ensuring the security of cloud-based resources. “We To read this article in full, please click here
Network World
DECEMBER 16, 2021
Log4j or Log4Shell has been around a long time—it was released in January, 2001—and is widely used in all manner of enterprise and consumer services, websites, and applications. Experts describe the system as an easy-to-use common utility to support client/server application development.
Network World
MARCH 7, 2023
Workspace One is VMware’s endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. To read this article in full, please click here
Network World
NOVEMBER 16, 2020
Founded in 2017, Banzai is known for developing Kubernetes-based cloud application development and security technologies. READ MORE: Gartner's top 9 strategic technology trends for 2021 To read this article in full, please click here
Network World
DECEMBER 23, 2020
The marriage of networking and security into the secure-access service edge stands to improve application performance, reduce infrastructure complexity, and protect sensitive data, and as such SASE is an attractive architecture for enterprises large and small. To read this article in full, please click here
Network World
NOVEMBER 30, 2020
ZTNA employs identity-based authentication to establish trust with entities trying to access the network and grants each authorized entity access only to the data and applications they require to accomplish their tasks. To read this article in full, please click here
Network World
FEBRUARY 13, 2023
The idea of employing observability tools and applications is a hot idea. To read this article in full, please click here Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.
Network World
MAY 18, 2021
Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021. To read this article in full, please click here
Network World
JUNE 29, 2023
The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications. also includes zero-trust capabilities and improved application access control.
Network World
FEBRUARY 7, 2023
Specifically, Cisco added more intelligence to its Duo access-protection software and introduced a new application called Business Risk Observability that can help enterprises measure the impact of security risks on their core applications. To read this article in full, please click here
Network World
DECEMBER 26, 2022
The answer is that networking is now, and forever, linked to business applications, and those applications are linked now to the way that we use the Internet and the cloud. To read this article in full, please click here What’s the single most important thing that enterprises should know about networking in 2023?
Network World
MARCH 15, 2020
Data and applications are at the hub of new business models, and data needs to travel across the extended network at increasingly high speeds without interruption. To read this article in full, please click here Digital innovation is disrupting businesses.
Network World
SEPTEMBER 7, 2020
Secure access service edge (SASE) is a network architecture that rolls software-defined wide area networking (SD-WAN ) and security into a cloud service that promises simplified WAN deployment, improved efficiency and security, and to provide appropriate bandwidth per application. To read this article in full, please click here
Network World
APRIL 7, 2022
And for every environment— Wi-Fi networks , Web applications, database servers. To read this article in full, please click here Picking just 10 Linux open source security tools isn’t easy, especially when network professionals and security experts have dozens if not several hundred tools available to them.
Network World
NOVEMBER 12, 2021
“You cannot just rely on the firewall on the outside, you have to assume that any application or any user inside your data center is a bad actor,” said Manuvir Das, head of enterprise computing at Nvidia. Zero Trust basically just refers to the fact that you can't trust any application or user because there are bad actors.”
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content