This was first published in May 2005
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
This was first published in May 2005
Use these free RFP template examples for ERP to make the best use of your business' technology resources.
This app's for you: The future of mobile personalization goes way beyond a recommendation for the next movie to watch or the closest pizza joint. But, the wonder of super-targeted apps has its creepy side too.
Medical and pharmaceutical researchers wrestle with finding meaning in big data variety and find that technology alone is still not up the task.
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.
Big data clusters require a different security model. Four common approaches can help security teams migrate beyond familiar RDBMS techniques, to the tools and processes required in new database environments.
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Updated Juniper security tool, DDos Secure, now offers broader DDoS intelligence to routers for improved attack mitigation.
To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
MCS is changing the way memory and storage mix. Integrate this storage technology onto servers to enhance big data and other intense apps.
Isolated, dedicated grounds, telecom grounds -- the performance and, more importantly, safety of data center equipment -- rely on proper grounding.
No mechanical refrigeration or dehumidification. No war between IT and facilities. Hear how Facebook's choices yield a PUE consistently below 1.10.
At the TDWI Executive Summit in Boston, users talked about the benefits and challenges of incorporating the Agile methodologies long practiced in development circles into data warehouse and business intelligence projects.
The number of NoSQL database options is vast, and distinct product categories occupy separate niches. That makes it imperative to understand what works best for specific applications when evaluating NoSQL software.
In this episode of the Talking Data podcast, the editors review happenings at the recent MongoDB World event. Apt use cases for this NoSQL-style database were discussed.