Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
For internet on the move, this gadget can be powered through a power adapter, battery pack or car charger.
Read the full review on Inspect-a-Gadget.
Business transformation is a hot topic in IT and business circles these days. But how do you actually make it happen? A CIO at a nationwide voluntary health organization tells his story here.
Hadoop's disappearing act, data science in New Yorker cartoons, and the elusive purple unicorn in big data: The Data Mill reports from Strata + Hadoop World.
How do you convince investors to fork over money for your new business concept? A detailed 'needs inventory' is critical, says SearchCIO small business columnist Bryan Barringer. Patience also helps.
The newly launched Apple Pay mobile payment system could deliver the most secure shopping experience for U.S. customers yet, though it still may not be perfect.
A variety of malware that steals passwords from jailbroken iPhones and iPads is becoming an enterprise concern. Expert Nick Lewis explains how to mitigate the risk.
The October 2014 Oracle CPU delivered fixes for 154 unique bugs, with Java vulnerabilities making up the bulk of the most pressing updates.
NetScout expands its network performance monitoring and security monitoring capabilities with Fluke, Arbor and Tektronix merger, but questions remain.
Dynatrace says it's ready to move APM from the IT trenches to the executive suite.
SN blogs: This week, an analyst shares why vendors need to rise to the occasion and launch marketing campaigns aimed at integrated computing.
Getting operations and development on the same page is a daily struggle. Choose the right DevOps tools, and you'll have Dev and Ops dancing at the company party.
Open IX's stringent standards keep workloads safe from natural and human disasters, but what's missing is a business climate that demands such rigor for outsourced workloads.
Vote for best DevOps and cloud management technology tool in the Modern Infrastructure Impact Awards.
TechTarget editor Joe Hebert investigates the recent Oracle OpenWorld and JavaOne conferences in this episode of BizApps Today.
When Lehman Brothers failed in 2008, regulators and other banks had precious little data to gauge wider financial risks. Enter legal entity identifiers, a form of semantic data.
Brian McKenna joins the Talking Data podcast crew to look at differences in managing and analyzing big data as handled by IT shops in the U.K. and continental Europe.