This was first published in November 2004
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
This was first published in November 2004
Mobile World Congress 2015 didn't disappoint, with breakthroughs in mobile payment, Internet connectivity, virtual reality and more. Also in Searchlight: Apple Pay fraud on the rise; former Secretary of State Hillary Clinton used private email for government affairs.
Enterprise mobile computing marches on, and data is proliferating. Companies need to put them together to compete effectively.
As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.
News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief.
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors.
An expert discussed some of the particular challenges associated with the international procurement of MPLS VPN services.
Aruba is pushing Wi-Fi indoor positioning to new levels with a platform geared towards venues that connect with visitors via their smartphones.
SN blogs: Analysts this week discussed why big data analytics needs to be reassessed and why Lenovo's response to Superfish spawned consumer distaste -- and distrust.
Mainframe systems need comprehensive preparations to maintain business continuity during a disaster. Unfortunately, there's no easy way to accommodate the mainframe in BC.
IBM acquired cognitive computing provider AlchemyAPI in the hopes it can whip up an application elixir that gives Watson new life.
Virtualization is a great idea, but not for everything in the data center. Even if your goal is 100% virtualization, leave these servers off the list.
Hadoop vendor MapR's latest release puts the focus on database replication across data centers. Also, Microsoft has built a Python-friendly Azure service for machine learning in the cloud.
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.