Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
The challenges startups face range from securing office space to finding affordable housing for the team when salaries are low or non-existent. Here's how PayPal is lending a helping hand with its Start Tank incubator.
IBM and Apple's pact to usher in analytics-enabled mobile apps to enterprises could be the start of a powerful friendship -- and spell doom for rivals. Plus, Google Q2 earnings and Oracle tackles Hadoop, all in this week's Searchlight.
In this video interview: Dell CIO Andi Karaboutis explains why she encourages IT to stop asking what the business wants and start imaging, 'What if there was a world where …'
With another round of patches for several serious Java flaws, Oracle's quarterly CPU showed that Java security problems are not receding.
Delaying security patches is a huge risk. Michael Cobb explains how to build the business case for a formal patching program for a variety of systems.
Michael Cobb explains why an enterprise in-house app store is an effective weapon against malicious mobile apps and dispels common misunderstandings against this means for securing employee devices and company data.
Half of networking devices are aging or obsolete, a new report says, as fallout from the recession continues to disrupt legacy network refresh cycles.
SN blogs: This week, an analyst said sharing threat intelligence information is a new security strategy; data analytics as a service offers all enterprises a competitive edge.
In case you missed it: Google forms a group of researchers to investigate security threats across the Internet. IBM partners with Apple to create business applications strictly for iOS use.
Even the best data center design drifts from its opening day to the present. Uptime shares its recommendations to map cooling power to today's IT load.
A data center's value is in the corporate information it stores and protects. Buy tools that support a data-centric, compliance-oriented architecture.
There are some powerful Linux performance tools available to system administrators -- the problem is knowing how to use them.
Long-time IT watcher Tom Davenport sees potential in the latest big data go-around, with enterprise Hadoop part of the mix.
IT recruitment expert Matt Mueller suggests that data management professionals amp up their big data skills and experience in order to stay competitive in a swiftly changing industry.
New high-performance data management systems are adding management traits, as a recent MemSQL release attests. Meanwhile, SyncSort shows a way to mainframe data on the cloud.