Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
The rounded, flat edges make the Nokia very comfortable and a pleasure to type with using both hands.
Today's sophisticated attacks can only be foiled when humans are in the loop. In part two of Future State, security expert Bruce Schneier gives advice on how to augment IR teams and processes for the future.
More organizations are realizing that strong incident response is the best way to prevent future attacks, but IR is still underfunded. In this installment of Future State, security expert Bruce Schneier lays out the state of IR today.
Russian-backed hackers could be at it again, this time targeting the White House. Experts advise businesses take a page from the hackers and get organized. Also in Searchlight: Apple CEO Tim Cook proudly comes out; Wal-Mart faces off with Apple Pay.
The outdated encryption protocol was spotlighted earlier this month when Google researchers released details on the POODLE attack, which preyed on systems that support the SSL 3.0 fallback mechanism.
News roundup: Verizon gave its mobile users an early Halloween trick: a cookie that cannot be erased, despite a number of privacy concerns. Also: compromising an air-gapped computer over the air; an alleged government-funded hack against a CBS reporter and more.
Multifactor authentication technology can be complicated. Expert David Strom explains what enterprises need to know before they invest in an MFA product.
SN blogs: This week, application development continues to extend resources to business users; smaller security companies join efforts to increase advantages.
New Extreme switch and wireless access point introduced by Extreme Networks delivers high levels of network performance at a lower price point.
New enterprise firewalls from Fortinet and SonicWall offer carrier-class speeds and feeds at a nice price.
Where data center manager monsters creep lies the scariest, ugliest, darkest sight you've ever seen. Follow the stairs through our haunted data center -- if you dare.
Choose the right data center provider or facility now, and prevent costly errors and inadequate services later.
What goes into your data center chiller might be warmer than expected, as energy use reduction efforts threaten the capacity of CRAHs and other cooling systems.
Hadoop has yet to be as widely adopted as consultant Joe Caserta expected -- and maturity issues are a big reason, he says in a Q&A on the much-discussed big data framework.
Version 3.0 of the Couchbase NoSQL database adds tunable memory capabilities, a streaming replication protocol, and other features designed to ease enterprise development and boost performance.
Hadoop may get most of the big data glory. But Strata + Hadoop World attendees said combining it with other technologies is what's really needed to power big data applications.