Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Sony Ericsson Xperia Arc - Specifications
The Arc has a 1GHz Qualcomm Snapdragon processor with 512 RAM.
The Arc also has a microSD slot which is expandable up to 32GB.
It's never been more vital to invest in products that can address today's complex business problems. In this recap, tweet chatters debate the pros and cons of building versus buying big data technologies.
Finding the right software tools to combat credit card fraud can save small businesses tens of thousands of dollars. Having a seasoned fraud specialist at the helm also helps. Just ask Speck Products.
Harvey Koeppel has been there, done that in terms of IT DR, but no disaster recovery and business continuity plan prepared him for the tragedy that struck when he was the CIO of a global bank on assignment overseas.
Vendors are hurriedly implementing a new patch released over the weekend for the 'Shellshock' Bash vulnerability, but researchers have since found more Bash flaws that will likely need prompt remediation.
Malvertising is already being used by attackers as a delivery mechanism for exploit kits, and new research reveals the problem is likely to get worse, specifically in the form of malicious Flash banners.
In this excerpt of Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides, the authors explain how to discover and extract malware from a Linux system.
Pertino adds several network services apps to its cloud-based WAN, giving IT pros the visibility and control they need over remote access.
SN blogs: October is Cybersecurity Awareness Month. One analyst says the industry should use the time to shed light on the industry's cybersecurity skills shortage.
Cisco Modeling Labs is a network simulator that uses real IOS images. Engineers can design, test and troubleshoot networks in software.
I want to write a shell script that contains commands for Linux partition creation. Can I automate everything so the user only inputs the partition size and details?
Schneider Electric aims to improve energy efficiency and sustainability. The company's EVP of IT products discusses the future of data centers -- and it's global.
Despite its initial cost, a converged infrastructure prevents a lot of the frustration of a heterogeneous data center, saving money long-term.
This episode of the TalkingData podcast looks at MapReduce and Hadoop's summer slog.
News briefs describe MapR's latest Hadoop distribution, which includes Apache Drill for SQL analytics. Also, InfiniDB said it will close down business.
Take this lighthearted quiz to test your recollection of key events in the development of cloud computing, many of which led to the marriage of big data and the cloud.