Tutorials

ipv6 new IP
supply chain

virtualization

What is NFV and what are its cost, performance and scaling benefits?

Network functions virtualization (NFV) uses commodity servers to replace specialized network appliances for more flexible, efficient and scalable services.

wifi patternwi fi

802.11: Wi-Fi standards and speeds explained

In the world of wireless, the term Wi-Fi is synonymous with wireless access in general, despite the fact that it is a specific trademark owned by the Wi-Fi Alliance, a group dedicated to certifying that Wi-Fi products meet the...

Wide-area networks: What WANs are and where they’re headed

WANs connect smaller networks across long distances, and their architecture, protocols and technologies have evolved to their latest incarnation, SD-WAN.

security map digital encryption identity

What is Zero Trust? A model for more effective security

The technologies that support Zero Trust are moving into the mainstream. Here's why security experts say it might be the best way to stop data breaches.

thinkstock 500773792 cpu processor

Spectre and Meltdown explained: What they are, how they work, what's at risk

Spectre and Meltdown are the names given to a trio of variations on a vulnerability that affects nearly every computer chip manufactured in the last 20 years. The flaws are so fundamental and widespread that security researchers are...

security internet network encryption privacy padlock

What is SSL/TLS? (And why it’s time to upgrade to TLS 1.3)

The TLS protocol encrypts internet traffic of all types, making secure internet communication (and therefore internet commerce) possible. Here are the basics of how it works and what comes next.

jw api driven dev2

Programming with Java APIs, Part 2: API definitions

Take Swagger for a test drive with this hands-on introduction to Java API programming with OpenAPI, Spring Web MVC, and Angular 2

Scrum Master Role Explained
video

The scrum master role explained

Watch this instructional video to understand how a scrum master can help a team learn agile development and follow a scrum process to develop new applications

outsourcing global map and workers

What is outsourcing? Definitions, best practices, challenges and advice

Outsourcing can bring big benefits to your business, but there are significant risks and challenges when negotiating and managing outsourcing relationships. Here, we break down everything you need to know to ensure your IT outsourcing...

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

authentication

What is SAML, what is it used for and how does it work?

The Security Assertion Markup Language (SAML) standard defines how providers can offer both authentication and authorization services. Here's what you need to know.

jw apidrivendev home

Programming with Java APIs, Part 1: OpenAPI and Swagger

Get started with API-driven development for cloud and microservices architectures

clicks pageviews traffic denial of service ddos attack 100613842 orig

DDoS explained: How distributed denial of service attacks are evolving

A distributed denial of service (DDoS) attack is when attackers attempt to make it impossible for a service to be delivered, typically by drowning a system with requests for data. They have been part of the criminal toolbox for twenty...

What is BI? Business intelligence strategies and solutions

Business intelligence (BI) leverages software and services to transform data into actionable intelligence that informs an organization’s strategic and tactical business decisions.

twins dual boot

Deduping in Salesforce: The complete how-to

Don’t be duped by Salesforce.com duplicate records. Deduping seems like one of those routine system maintenance issues, but it’s actually very tricky and there's no undo.

Load More