This was first published in May 2004
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
This was first published in May 2004
Tom Koulopoulos, co-author of "The Gen Z Effect" spoke to SearchCIO about how Gen Z-ers think about privacy, data ownership and failure, and what CIOs should do about it.
At Goldman Sachs, a homegrown graph analytics platform has become a tool for compliance and fraud detection. The use case is a good one because risky behavior is also social behavior, according to an expert.
Keeping up with the speed of innovation is only one of many hurdles today's CIOs must clear. In this #CIOChat recap, take a look at the top CIO challenges in today's digital era.
Expert Dan Sullivan outlines three use case scenarios for security analytics tools and explains how they can benefit the enterprise.
The Ponemon Institute says enterprises are devoting millions of dollars to mobile application development, but barely any of the money is focused on security.
The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk.
SN blogs: This week, analysts discuss how big data initiatives are affecting businesses; one expert warns about the dangers of unknown appliances in the data center.
Download this free chapter excerpt from "Network Know-How" to gain insight into basic network troubleshooting techniques. Identify and solve most networking errors in your environment.
Virtualization and storage spark fears of a new era of black box opaqueness for today's network engineers. But hope remains.
Increasing physical demands of modern IT gear can pose problems for classic rack enclosures. Watch for these factors when buying new racks or equipment.
I want to install a virtualization environment with physical servers for failover and a storage server to boot up some virtual servers in our network. How can I do this?
Space, power, cooling and equipment improvements give your data center new life. Do it right to keep costs down.
New database updates address large-scale applications. Included are Couchbase Server 4.0 with multidimensional scaling support and VoltDB 5.0 with links to Hadoop data streaming tools.
Chief data officers are becoming more prevalent in companies, and more necessary, consultant John Ladley said in a webinar -- so much so that he thinks 2015 could be 'the year of the CDO.'
The parallel processing platforms underpinning big data systems can help machine learning newbies and vets alike. TechTarget editors discuss how that may play out in this Talking Data podcast.