Bỏ túi các kinh nghiêm lô đề 3 miền từ những cao thủ lâu năm

?
Search 1314 results found
Page Thumbnail
Article Cisco

What is SD-WAN (Software-defined WAN)?

SD-WAN is the next generation of WAN edge networking. Learn what it is, how it works and how it’s different from traditional branch routing.
Page Thumbnail
Article AWS

AWS 2021 re:Invent Recap

Our WWT cloud experts re:cap AWS re:Invent 2021!
Page Thumbnail
Article Service Provider Mobility (4G/5G)

11 Smart City Use Cases

We've compiled 11 of the most popular smart city use cases WWT customers have deployed in their smart city initiatives.
Page Thumbnail
Article AWS

Migration From On-Prem to AWS Kubernetes EKS

This article will discuss the migration framework WWT uses to migrating existing on-premise containerized services into the Amazon Web Services (AWS) cloud, specifically covering AWS Kubernetes Service (EKS) as a migration target.
Page Thumbnail
Article Security Operations

Log4J Zero-Day Exploitation: What You Need to Know

Widespread zero-day exploitation is underway for a Log4J vulnerability (CVE-2021-44228) enabling remote code execution (RCE) if exploitation is successful. A significant number of popular and integrated solutions are impacted and are actively being exploited by adversaries.
Page Thumbnail
Article Application Services

DevOps: A Survival Guide for Infrastructure Teams

Learn how infrastructure teams can start taking part of DevOps efforts within their organization.
Page Thumbnail
Article Security Strategy

What is Log4J and What's the Problem?

What could prove to be one of the most significant vulnerabilities in many years has been found in a piece of open-source software known as Log4j. This commonly used piece of software is very widely used and the impact of exposure to threat actors is frightening.
Page Thumbnail
Article DevOps

Mitigating Log4Shell With the Help of Synopsys Blackduck and a DevOps Culture

Get an overview of how WWT internal developers and Application Services delivery teams were able to quickly identify and mitigate exposure to the recent Log4j vulnerability (CVE-2021-44228).
Page Thumbnail
Article Consulting Services

Getting Started with Data Analytics Use Cases

We've learned a few lessons when it comes to the process a business can take to maximize success with data science.
Page Thumbnail
Article Intel

eBook: Harness the Potential of Cloud to Drive Digital Transformation

Learn from industry experts how cloud computing is central to nearly all digital transformation efforts.
Page Thumbnail
Article Cisco

Comparing Two-Tier and Three-Tier Data Center Networks

Modern applications require a modern data center infrastructure, and Two-Tier, spine-leaf architectures offers many advantages over traditional Three-Tier designs.
Page Thumbnail
Article Zero Trust

3 Considerations When Building Your Security Architecture

Organizations are spending more on cybersecurity as the attack surface widens. CISOs can make sure these investments pay off by thinking about security architecture in the context of the business, solution agility and security operations.
Page Thumbnail
Article Cisco DWDM

400G-ZR & ZR+: The Latest in Pluggable Coherent DWDM

The convergence of DWDM and routing technology — are 400G pluggable DWDM optics the key to this long-sought union? Let’s take a look.
Page Thumbnail
Article Fortinet Next-Generation Firewalls

Azure Virtual WAN: A Deep Dive Into Microsoft's Cloud Networking Architecture

Get a deep dive into Azure Virtual WAN architecture, including some key points that speak to why organizations might want to look into this as a means to connect campus and branch locations to the Azure cloud.
Page Thumbnail
Article Meetings

Why Workforce Personas are Key to Reopening Offices

Who should return to the office and who should remain remote? By taking a persona-based approach, organizations can quickly determine how their workforce will be distributed and create a strategic plan for reopening.
Page Thumbnail
Article Cisco Multisite Orchestrator

Cisco ACI Multi-Site vs. Multi-Pod

Understanding these two powerful yet distinct architectures is paramount to deriving maximum value from your data center network powered by ACI.
Page Thumbnail
Article Consulting Services

Data Discovery, Validation and Risk Control

As modern working practices continue to shift and IT landscapes expand and evolve, so does the need to better understand data flows to effectively manage their ever-increasing complexities.

Article

Article HPE DL380

Are you just moving a bottleneck in your VSAN Solution?

One of our customers asked us to do a Proof of Concept (or POC) around some very customized performance based testing around vSAN technology. That being said, this ATC Insight gets into the weeds of benchmarking, so prepare yourself for a fun ride!
Page Thumbnail
Article Optical Networking

CWDM or DWDM: Which Should You Use and When?

While the two types of wavelength division multiplexing —CWDM and DWDM — are both effective methods to solve increasing bandwidth capacity needs, they are designed to tackle different network challenges.
Page Thumbnail
Article Microsoft

How to Clone Objects in C# .NET Core

There are numerous ways to clone an object in C# .NET Core. This article explores some of the approaches you can use to make a deep copy of an object and the pros and cons of each method.
Page Thumbnail
Article Node.js

Using Jest to Run Integration Tests

Jest is a popular unit test framework that can easily be extended to include integration tests. We'll discuss writing an integration framework in a Node environment backed by a MySQL database.
Page Thumbnail
Article Cyber Resilience

Evolving Cybersecurity Operations Across the Organization

Successfully defending the organization requires more than guarding against security threats. As organizational success and technology become more intertwined, a holistic cybersecurity operations program can be the piece of the puzzle that helps CISOs connect organizational goals, technology investments and daily defense.
Page Thumbnail
Article Application Services

REST API Integration Testing Using Python

Learn how to use Python to create a REST automation test suite.
Page Thumbnail
Article Application Services

TypeScript Records and Mapped Types

Let's take a tour of TypeScript's Record and Mapped Type features by looking at their usage and evolution within a project.