Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Gain insights into addressing the challenges of the mobile enterprise with these tips and videos, and learn how BlackBerry Enterprise Service 10 can help you balance end-user and corporate needs.Click Here
IT organisations of all sizes are tasked with simplifying operations and cutting costs. Access the videos, case studies and papers on this website to learn how Dell Efficient Enterprise can help.Click Here
Find out how to make the most of your applications investments and address business challenges in areas such as mobility, integration and sourcing strategies.Click Here
Learn how Cisco’s cloud and mobility solutions can help organisations revise strategies to meet internal and external demands, and gain greater expert insights with white papers, videos and e-guides.Click here
The rounded, flat edges make the Nokia very comfortable and a pleasure to type with using both hands.
Not all rogue IT is bad for business. Here, we look at how CIOs keep tabs of the tech outside of IT and handling risk.
The consumerization of IT and increasing demands for business agility are forcing the evolution of rogue IT. How are CIOs responding?
When thinking of rogue IT in today's enterprise, envision the Big Bad Wolf from Little Red Riding Hood.
Increasingly sophisticated malware can divert the attention of IT departments from low-level security gaps. Here’s why you need a strategy that works on all levels.
Attorney Marcia Hofmann says without new data privacy laws, the FBI can strong-arm providers into handing over customers' sensitive data.
To defend against "laterally" moving attackers, consider granting privileged users the least privileges necessary. Expert Nick Lewis explains how.
SSH security is going unmanaged, leaving organizations susceptible to internal, external attacks. Centralized management of SSH keys is necessary.
Like Tinker Bell, network engineers can work magic by sprinkling fairy dust on formerly dormant equipment. And it doesn't cost a cent.
Expert Michael Gregg discusses how dynamic Address Resolution Protocol inspection helps prevent hackers from penetrating enterprise switches.
Server refresh cycles can be more nuanced than a rip and replace of used servers. Consider these options for longer server lifecycles.
When a process fails, go for the kill. You know how to start and stop Linux services, but what happens when you need to kill one?
Choosing a data center asset management tool depends on how the infrastructure functions, the mix of hardware and software in action and more factors.
Organizations should meet a few key program development goals prior to implementing an MDM initiative, according to MDM expert Anne Marie Smith.
Highlighting the benefits of an MDM program from both technical and business perspectives is essential to gaining support for funding.
In many organizations with big data projects, Hadoop clusters are moving toward peaceful coexistence with data warehouses and data governance efforts.