This was first published in March 2005
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
This was first published in March 2005
To take on the Internet of Things, CIOs will need an IT architecture with built-in digital intelligence to keep up with changing market forces and create competitive advantage. The Data Mill reports.
Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
Silverlight security issues will demand more attention as attackers increasingly target the plug-in, leaving users vulnerable to various exploits.
The Amazon Fire Phone has the potential to ignite interest among enterprise users, but are security issues lurking beneath its shiny façade? Expert Lisa Phifer reviews the Fire Phone's security features and shortcomings.
In his debut 'Security that Works' column for SearchSecurity, Eric Cole of the SANS Institute challenges infosec pros to grade themselves on the three fundamental aspects of any successful enterprise security program.
Broadband over Power Line seems like a viable option to provide last-mile connections to anchor IoT. Don't hold your breath, writes Patrick Hubbard.
Silver Peak's new Unity software with cloud intelligence gives businesses more control and better performance of cloud-based applications by mapping optimal routes over the Internet for cloud traffic.
SN blogs: This week, analysts discuss the importance of strategic vendor partnerships, the lack of security in IoT devices and why SDN might not be necessary for some network operators.
A lot goes into the decision to use converged infrastructure. Some factors are subjective while others involve straightforward cost calculations.
Systems performance monitoring and troubleshooting change when you move to cloud architecture. A cloud can scale up over most problems, but do you really want to pay for that?
Third-party cloud certifications are on the rise, with CompTIA seeing cloud technology infiltrate its major certifications. But some IT experts question the value of a certification that eschews vendor-specific information.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.
Data industry veteran Anne Marie Smith discusses pressing issues, including the barriers to unstructured data governance. Part one in a series on data matters.
Hadoop vendors are pushing an approach that puts the distributed processing framework at the center of data management architectures. But some issues could sink the idea.