Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
HTC seem to be heading the quad-core revolution after leaked shots and details of its HTC Edge Android powered phone came out sporting an Nvidia Tegra 3 quad core processor. While other reports suggest CES might come too early for the phone, we should expect to see a quad-core tablet.
CIOs chasing top tech talent might want to look past age on a resume. Silicon Valley firms are turning to high schools to edge out the competition; plus millenials could automate their own demise and high-tech veggies in Searchlight.
In this video excerpt, Markley Group CTO Patrick Gilmore talks about why today's ideal security engineer is someone who is paranoid, aggressive and really liked to hack stuff as a teenager.
Data scientists look to Apache Spark to ask the really big data questions and get answers faster.
Former CSO Paul Howell details the school's Heartbleed response and how he overcame challenges with assessment, patching and communication.
News roundup: Facebook's manipulation of users' news feeds has reignited the data privacy debate regarding how enterprises should manage user data.
While you may have never heard of a secure Web gateway, it may be the Swiss army knife of converged security your enterprise needs.
In this week's blog round up, analysts discuss Android security risks, big data analytics, women in technology and APM.
MPLS traffic engineering can improve VPN performance to ensure data travels the most efficient path.
Xirrus announced 802.11ac Wave 2 upgradability through its modular Xirrus XR Arrays in anticipation of Wave 2 shipping next year.
Are you big enough to take advantage of DCIM or virtualization for the power and cost savings? When it comes to certain moves, size is an advantage.
Many corporations are switching to a private cloud, which doesn't have to be a dramatic transition. Follow these tips to an easy private cloud move.
Forget about /etc/fstab and autofs. There's a new Linux system around. Systemd manages mounting and automounting of file systems differently.
Tibco has updated its LogLogic software that's used to manage log data collected from operational applications, integrating the technology with its event processing and Spotfire analytics tools.
IT recruiting expert Matt Mueller explains why obtaining a specific degree or certification in data management shouldn't be a job seeker's top priority.
In a video interview, consultant Claudia Imhoff discusses the increasing need to augment data warehouses with technologies such as Hadoop and real-time analytics systems.