Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
Are you keeping your project pipeline in check? Review our recent stories and take our quiz to assess your knowledge of IT project management essentials.
Agile development guru Jim Highsmith makes the case to CIOs that adaptation is tantamount to business survival. Here is his prescription for adaptive leadership.
Listen up IT executives, it's time to stop pondering the IT skills gap and adapt leadership, training and recruiting styles to resolve it. IT and business strategist Harvey Koeppel explains how.
Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise.
With viable job and training opportunities finally emerging, the time is now for CISOs and hiring managers to boost infosec's ranks with non-traditional candidates.
SN blogs: This week, analysts discuss Progress Software's use of rapid application development and review a tool small businesses can use to protect their data.
In an ever more dangerous world, your trusty VPN has a more important role than ever.
SN blogs: This week, analysts discuss how white-box switching will become more affordable, and why multinode server platforms aren’t much different from blade servers.
The Open-IX data center certification aims at resiliency through self-declared certification and an annual renewal process, rather than proprietary oversight.
Old ways of securing physical networks are giving way to logical techniques. The change in traffic to an East-West, data-center-centric, software-defined-network model necessitates a new security plan.
Enterprise IT shops have new choices: Converged systems simplify management and scaling, while commercial off-the-shelf servers tailor resources without vendor lock-in.
Data management product announcements by HP, SAP and NuoDB show greater support for SQL on Hadoop analytics, enhanced cloud deployment and mixed processing workloads.
Piles of "messy" data meet inexpensive storage as e-commerce website TrueCar builds a data-driven business with the help of a Hadoop cluster and data analytics tools.
In this BizApps Today video report, editors Joe Hebert, David Essex and Don Fluckinger discuss new products and inside stories from recent HR Tech, Workday and CHIME events.