As most network professionals know, change is an inevitable part of the journey — often necessary, and sometimes difficult.
After many years of serving as a trusted resource for IT and networking professionals, Network Computing will cease publication on September 30, 2025. Informa TechTarget has made the decision to discontinue Network Computing, recognizing the shift in reader needs and information consumption.
Throughout its history, Network Computing has provided valuable insights, expert analysis and practical guidance to help navigate the complexities of enterprise networking. We extend our sincere thanks to all readers, contributors and partners who have supported Network Computing over the years. Your engagement has been instrumental in shaping the publication’s legacy.
While Network Computing will no longer publish, Informa TechTarget remains dedicated to serving the IT and networking community through other channels and initiatives. You can find coverage on many of the topics Network Computing once covered on Informa TechTarget’s other properties, including SearchNetworking, InformationWeek and Light Reading.
Thank you for your support and for being part of the Network Computing community.



Speak Your Mind