Last weekend the Young Rewired State Competition was held for budding young computer programmers. The fourth annual week-long "digital Olympics" was sponsored by SAP.
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
What separates the high earners from the low earners among senior IT executives? The ability to negotiate a bonus helps, according to the 2014 TechTarget IT Salary and Careers Survey.
IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.
Is your enterprise mobile app development strategy download-worthy? Discuss mobile app dev in our SearchCIO tweet chat Wednesday, Oct. 29, at 3 p.m. EDT.
When evaluating the business cases for MFA in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation.
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision.
SQL injection attacks continue to plague enterprises. However, performing audit code validation when using outsourced developers can be a challenge. Expert Nick Lewis explains how to prevent these attacks.
The Cisco IOx platform has been updated to help businesses simplify the management of IoT endpoints and applications.
There's been a lot of talk recently about Cisco vs. HP switches. Read this comparison to help you choose the best networking switch.
National Cyber Security Awareness month has been around for 11 years, but more talk -- and action -- is needed to achieve real goals.
COBOL might be one of the oldest programming languages, but that doesn't mean developers know all there is to know. We have expert insights on COBOL basics.
You can't depend on a building system to run the data center. Implement a BMS and a DCIM tool to monitor and predict system changes, tighten security and more.
Getting operations and development on the same page is a daily struggle. Choose the right DevOps tools, and you'll have Dev and Ops dancing at the company party.
TechTarget editor Joe Hebert investigates the recent Oracle OpenWorld and JavaOne conferences in this episode of BizApps Today.
When Lehman Brothers failed in 2008, regulators and other banks had precious little data to gauge wider financial risks. Enter legal entity identifiers, a form of semantic data.
Brian McKenna joins the Talking Data podcast crew to look at differences in managing and analyzing big data as handled by IT shops in the U.K. and continental Europe.