Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
Piracy - Digital Britain
Piracy for gain is theft and will be pursued through criminal law
ISPs will notify content providers of piracy offenders and disclose their identity
As an interim step, ISPs may be required to block IP addresses or restrict bandwidth to offenders
Tom Davenport lays out five strategies for surviving automation; big data evolves; and the high-end food industry feasts on big data: The Data Mill reports.
It can be tempting to stray from the security roadmap security professionals have put in place when data breaches like the Sony and Anthem breaches are all over the news. But experts say it's crucial to stick to the security basics.
With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.
What is 'good enough' security and when you need something better.
There's no shortage of new security technology, but enterprise integration is still a major hang-up, says AT&T's chief of security.
Following the theft of data affecting about 50,000 of its drivers, Uber says it has filed a subpoena to obtain GitHub data that may pinpoint the source of its data breach.
A Texas beer distributor has used Cisco's IoT devices and networking equipment to lower energy costs and improve worker productivity.
The city of San Jose experimented with several types of network connectivity for transporting IoT data, which it's analyzing to help plan for future population growth.
The Las Vegas Sands' wireless LAN carries traffic from thousands of guests and conference attendees, plus a growing number smart devices using IoT technology.
Performance monitoring tools preemptively thwart run-the-business application problems, but only when you have the right APM tool for the job.
Disaster recovery planning and infrastructure builds vex IT managers. Cloud services offer lower costs and more flexibility, but not without risk.
Most of the IT budget goes to maintaining the data center hardware and software. Consider outsourcing for better support.
Hadoop vendor MapR's latest release puts the focus on database replication across data centers. Also, Microsoft has built a Python-friendly Azure service for machine learning in the cloud.
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.