Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
The Government will also ensure that all information is published on a single ’gov.uk’ domain name by the end of 2012 and will move to a ‘digital by default’ approach to its transactional services by 2015.
To take on the Internet of Things, CIOs will need an IT architecture with built-in digital intelligence to keep up with changing market forces and create competitive advantage. The Data Mill reports.
Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
Social media compliance is not typically considered a big issue for companies, but expert Mike Chapple explains why it should be.
The Community Health data breach exposed the personal data of 4.5 million patients of the healthcare entity, opening up potential regulatory issues.
ExtraHop integrates its wire data monitoring platform with big data hubs MongoDB and ElasticSearch to expand opportunities for IT operations analytics.
Broadband over Power Line seems like a viable option to provide last-mile connections to anchor IoT. Don't hold your breath, writes Patrick Hubbard.
Silver Peak's new Unity software with cloud intelligence gives businesses more control and better performance of cloud-based applications by mapping optimal routes over the Internet for cloud traffic.
With sales sagging, legacy hardware suppliers are scurrying to form partnerships with a new generation of converged infrastructure vendors. But will these newly minted converged systems convince IT to open up the purse strings?
UPS sizing is hard, with confusing terminology and an ever-shifting IT load. If you get the calculations wrong, don't worry about a Michael Bay movie scene in the data center. Here's what to do when UPS is too wimpy or too beefy for the task.
A lot goes into the decision to use converged infrastructure. Some factors are subjective while others involve straightforward cost calculations.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.
Data industry veteran Anne Marie Smith discusses pressing issues, including the barriers to unstructured data governance. Part one in a series on data matters.
Hadoop vendors are pushing an approach that puts the distributed processing framework at the center of data management architectures. But some issues could sink the idea.