Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
Karl Flinders, Deputy News Editor
Karl covers: Banking and Finance, business services; Insurance; Outsourcing; SOA; Software development; Oracle strategy; Accenture strategy; Co-ordinate downtime.
Meet our team.
IT innovation is on every CIO's agenda -- or it should be. Before plotting your strategy, consider these eight tips from 7-Eleven's innovation guru.
The future of multichannel integration and customer engagement is nigh -- is your company prepared? In this #CIOChat recap, read tweet chatters' tips and predictions.
How do you make your digital engagement strategy stand out? In this #CIOChat recap, participants praise innovative customer engagement approaches and look ahead to the future of multichannel.
Expert contributor David Strom takes readers through the ins and outs of this SaaS-based multifactor authentication solution for boosting login security.
Security expert Michael Cobb explains what Open Authorization or OAuth 2.0 is, its pros and cons, and how it is different from bring your own identity.
Expert David Strom looks at how Secure Auth IdP uniquely combines multifactor authentication and single sign-on login capabilities in a single product.
Shrinking data centers, wireless upgrades, cloud access and new security approaches dominate 2015 networking projects.
Riverbed Technology has agreed to go private and be acquired by private equity investment firm Thoma Bravo for $3.6 billion, or $21 per share in cash.
With SDN and the integration of wireless networking within enterprise infrastructures, IT must carefully assess its network management needs.
TIA data center standards address cabling systems with performance, budget and future plans in mind. New concepts bear consideration as well.
IBM's z/OS Connect is a fresh way to tie in mainframe processing with Internet applications. See what it does and how it overlaps with existing software.
Stumped when it comes to buying the latest gadgets for geeks? Have no fear -- our experts are here with their wish lists to offer some suggestions.
The Internet of Things, the data lake and the "age of the customer" stole headlines this year. TechTarget editors explain why in this BizApps Today episode.
A German company vies with the likes of Amazon by adding Apache Storm and Spark to its portfolio, along with Talend 5.6 data integration.
Amazon Web Services has matured, with support for large companies and new services to help manage environments.