This was first published in March 2009
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Visit this site to learn about Oracle's innovative data center, business analytics, customer experience and cloud computing solutions and get the latest expert advice with our videos, white papers, eGuides and more.Click Here
Visit this page to find valuable cloud computing and business analytics tools and information from IBM. Learn how to advance your business analytics and cloud efforts.IBM Insights: Smarter Cloud & Analytics
Find out how to make the most of your applications investments and address business challenges in areas such as mobility, integration and sourcing strategies.Click Here
Visit this site to learn about the latest, most effective approaches for business process improvement and find expert videos, white papers and advice from Kofax.Click Here
This was first published in March 2009
Learn how to tackle cybercrime from former White House CIO Theresa Payton and former federal Cybersecurity Coordinator Howard Schmidt.
IT business strategist Harvey Koeppel draws on historical data to explore the 'Big Data Frontier' and its potential to profoundly change the world.
The rise of the chief procurement officer raises questions about the role of IT.
Expert Michael Cobb details how using EMET, a free tool from Microsoft, can harden Windows XP and other legacy applications.
Expert Nick Lewis details how automated exploit kits are evolving and offers mitigations for the latest methods employed by these attack toolkits.
Network consultant Peter Welcher talked to SearchNetworking about the evolution of WLAN test tools as more businesses look to wireless networks.
Expert Patrick Hubbard shares how you can make your life easier by alleviating some annoying network routing issues.
The Wi-Fi Alliance certification program continue to expand as more devices, applications and users rely on Wi-Fi for connectivity.
VMware's upcoming public cloud and AMD's 64-bit ARM servers are technologies for the data center that exemplify the changes in the IT industry.
Stagnant strategies for data center cooling will keep energy bills climbing ever higher, but a more modern approach can bring them back down to earth.
The rise of converged systems has brought a new level of manageability to the data center, but these integrated offerings have a few drawbacks.
A podcast interview with SAS leaders Jim Goodnight and Jim Davis looks at big data enablers, including in-memory analytics.
SearchDataManagement's Mark Brunelli and Jack Vaughan talk about this year's Enterprise Data World conference, which was held recently in San Diego.
Consultant David Loshin offers tips on developing a data quality strategy that can help identify data errors before they cause big business problems.