This was first published in July 2004
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
This was first published in July 2004
Learn about one approach to mobile app development that cuts the amount of resources that go into expensive software development and testing.
Application consolidation is not for the faint of heart. Among other hurdles are the users who threaten mutiny. Niel Nickolaisen offers advice on getting the deed done.
Application consolidation is never an end unto itself. It's the business benefits that matter. SearchCIO columnist Harvey Koeppel explains.
Email encryption is a valuable security tool for enterprises, but where and how should it be deployed? Expert Karen Scarfone outlines specific use cases for email encryption software.
An FTC report urges vendors to be proactive in creating Internet of Things security and privacy controls, while a Tripwire survey shows IoT devices are a growing corporate risk.
With a number of new network security certifications available, knowing which one will best help your career can be confusing. Expert Kevin Beaver discusses the options.
ICYMI: F5 Network upgraded its BIG-IQ to provide a more integrated framework; a California convention center is rolling out a 10 Gbps Wi-Fi network.
Brocade is promoting router encryption in the release of its MLXe security module, but expert opinions fall short of unanimous endorsement.
Cisco ONE provides a single license for all-in-one hardware and software package aimed at a specific networking use case, but it may be the high-priced option.
To use Chef in the data center, you'll find your administrator mind-set gradually opening up to the developer way of thinking. These tips and resources will accelerate the process.
Data centers teem with unpredictable equipment -- about 42U tall and prone to failure -- but also are loaded with on-board intelligence: IT teams.
Can administrators set IBM mainframe jobs to update Oracle databases directly, or are there incompatibilities between the systems?
Data supply chains serve to turn raw data into useful business information, says Accenture's Vincent Dell'Anno.
New technologies may point the way to improved data collection, but organizations need to shore up data management and security practices first.
An update to Oracle's GoldenGate replicator is on tap. And, Xplenty and Segment connect on Hadoop processing in the cloud.