Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
In this Q&A, a data scientist explains why he combines objective data with human critiques to assess risk in Gilt's pre-emptive shipping program.
In this Q&A, Igor Elbert describes Gilt's pre-emptive shipping program, which leans on his expertise in machine learning and predictive modeling.
Is your organization better suited to build, buy or blend its big data architecture? Discuss with SearchCIO during #CIOChat Wednesday, Sept. 24, at 3 p.m. EDT.
In this all-new CISSP Essentials Security School lesson featuring a two-part video tutorial, learn about the CBK section covering access control.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.
Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.
Aerohive and Radius Networks have partnered to combine Wi-Fi infrastructure with iBeacon technology to offer proximity services for businesses.
Assessing the performance of your new ADC requires careful benchmarking. Here's what to look for.
When considering an ADC platform, take the time necessary to ensure the prospective system meets your requirements.
There's a lot of hype about continuous deployment in DevOps circles, but it can be disastrous if the right culture and organization aren't in place.
GPUs offload the burden of demanding computational tasks from central processors. Integrate GPU into enterprise servers to manage intense computing.
It's time to knock down those silos, one by one. IT is transforming from a siloed set of reactive cost centers into a service provider with a focus on helping the business compete.
New technology is giving personnel departments a bigger role in building the business -- helping them hire and retain people with the right skills.
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
Hadoop buzz dimmed down during summer's dog days. Its old pal MapReduce is somewhat to blame.