Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Eset giant iRobot - Infosec 2009
On the Eset stand they had a giant robot that looked great but didn't do much.
Does your organization know what to look for in order to hire the right information technology talent? Discuss the IT skills gap in our SearchCIO tweet chat Wednesday, Aug. 27, at 3 p.m. EDT.
Heartbleed resurfaces in a Tennessee health system's breach, and UPS customers' data is in danger. Is assuming the worst enough? Also in Searchlight: Steve Ballmer signs off from Microsoft's board; Twitter, Facebook tinker with more experiments.
Who is the chief data officer, really? Four CDOs describe their first 90 days, their primary objectives and their biggest mistakes at a recent symposium.
The difficulty of detecting Heartbleed exploits means that the Community Health breach is unlikely to be the last incident linked to the OpenSSL flaw.
News roundup: Heartbleed vulnerabilities, point-of-sale malware and phishing scams are nothing new, yet numerous companies continue to fall victim to them. Shouldn't the lesson be learned by now? Plus: HTTP Shaming, Dropbox improvements and more.
A vendor report found that while mobile malware may receive more attention, unrestrained mobile app data collection actually poses a greater risk to consumers and data security.
SN blogs: This week, analysts say that application ease of use is the most important; FIDO is working on new authentication standards.
WAN aggregation allows continuous, high-performance networking, and software-defined networking delivers greater security, visibility and control. In this tip, expert John Burke evaluates both technologies to help you better optimize your network.
The Georgia World Congress Center has upgraded to 802.11ac Meru wireless technology to support thousands of attendees, exhibitors and mobile devices.
Data center equipment refreshes are expensive and time-consuming, but there are ways to ease the most arduous steps of the IT lifecycle -- and possibly even make a little money.
Remote KVMs represent both convenience and potential for disaster. A few simple security steps can prevent downed servers, whether from an intentional attack or a simple miscommunicated update.
Make sure you know what is significant about the mainframe. Take this quiz to find out what you should brush up on.
Despite finding their way into Gartner Magic Quadrant reports, vendors of NoSQL databases are still in the early-adopter stage with users. Is there a need for NoSQL software in your organization?
Consultant William McKnight talks about the potential uses of in-memory databases and the processing benefits they can provide to organizations.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.