Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Cloud computing economics defy easy calculations. This issue of 'CIO Decisions' e-zine explores how to put a dollar amount on the benefits and drawbacks of cloud.
Is your company a bystander to the digital economy? Understand the three characteristics of digital goods, says an MIT Sloan professor, and you could be on your way to becoming filthy rich (or better yet, saving the world).
Big data needs better questions; local data concierges might be the next information governance trend; and the downside of data: The Data Mill reports.
CISOs need buy-in from the top down to build successful software security programs.
The career is only now defining itself.
Building on what cybercriminals began, security services from many countries have the capability to attack and steal for their national interests.
If you blinked, you may have missed it: A consortium formed this summer to develop a 25 Gigabit Ethernet specification, with plans to have 25 Gbps switches shipping in two years. Here's why the industry is in such a hurry.
As more businesses moves to mobile platforms, enterprises have to make sure their mobile applications perform like they're supposed to. Vendors are trying to address that need with more granular mobile application performance management (APM) tools.
Networking pros have little insight into why a mobile app misbehaves, but they can be sure the network will be blamed. Newer mobile APM tools with more granular visibility and controls aim to identify and resolve problems faster.
Carrie Higbie, networking expert, brings her long-term data center experience and sense of fun to SearchDataCenter's advisory board.
In the old days, all data was created -- and protected -- equally. In today's data center, ever-changing rosters of VMs and LUNs call for a new data backup arsenal.
I want to write a shell script that contains commands for Linux partition creation. Can I automate everything so the user only inputs the partition size and details?
Agriculture, social media, IBM's Watson system and other global topics were discussed at EmTech MIT 2014, with big data wrangling often at the fore.
Consultant Colin White says cloud-based big data systems require the same kind of data management attention as their on-premises counterparts do.
It's hard to pin down exactly what big data is -- and that makes the term almost meaningless, and even cringeworthy, says consultant Rick Sherman.