Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
CIOs and their application teams need to help their businesses develop a coherent digital customer strategy. Forrester Research's Stephen Powers and Mark Grannan outline the tools required to manage, engage and measure digital customer experiences.
A new report shows that hackers can get past even the most up-to-date security tools. Could CIO insecurity be partly to blame? Plus, download Facebook's Messenger app or bust, and glasses might soon become moot -- all in this week's Searchlight.
On-the-spot decision making and in-the-field analysis are two of the many benefits that make mobile analytics a worthy investment.
Threat intelligence feeds help you prioritize signals from internal systems against unknown threats. Security intelligence takes it a step further.
FedRAMP raises the bar for security among applicable cloud providers, but can it influence broader cloud computing contracts and standards?
Immature products and a lack of standardization raise critical questions about first-party risk and third-party liability.
Network downtime is often a necessary evil for network upgrades, but in the world of 24/7 broadcast media, maintenance windows are hard to come by.
Networking pros don't need to become code monkeys, but a little network programming can go a long way toward advancing their careers.
Cisco launched a bevy of new career certifications, including a CCNP update and training in industrial networking, network programmability and IT-business interaction.
Got certificate problems causing your servers' connections to fail? Here's how to find out what's causing them harm and how to fix it.
MCS is changing the way memory and storage mix. Integrate this storage technology onto servers to enhance big data and other intense apps.
Isolated, dedicated grounds, telecom grounds -- the performance and, more importantly, safety of data center equipment -- rely on proper grounding.
At the TDWI Executive Summit in Boston, users talked about the benefits and challenges of incorporating the Agile methodologies long practiced in development circles into data warehouse and business intelligence projects.
The number of NoSQL database options is vast, and distinct product categories occupy separate niches. That makes it imperative to understand what works best for specific applications when evaluating NoSQL software.
SearchDataManagement's Joe Hebert and Ed Burns discuss the gulf between Hadoop hype and enterprise adoption that was highlighted at the 2014 TDWI conference in Boston.