Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Classic Start 1 is a free download available via the Windows Store in Windows 8, which adds a Start menu. The Start button appears when you click on Desktop in Windows 8.
CTO Niel Nickolaisen explains how a custom cloud met changing customer demands, and how he pulled one off while sidestepping the evils of customization.
In this Ask the Expert, Forrester analyst Jeffrey Hammond tackles how to redirect the development culture to support mobile application development.
Find out how to tweak your mobile app dev efforts to achieve a five-star app rating in this Ask the Expert with Forrester analyst Jeffrey Hammond.
Video: Keith Barker of CBT Nuggets shows how to use the BeEF Project, a free penetration testing framework, to train employees on Internet browser security.
In an advisory Friday, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
The difficulty of detecting Heartbleed exploits means that the Community Health breach is unlikely to be the last incident linked to the OpenSSL flaw.
SN blogs: This week, analysts say that application ease of use is the most important; FIDO is working on new authentication standards.
WAN aggregation allows continuous, high-performance networking, and software-defined networking delivers greater security, visibility and control. In this tip, expert John Burke evaluates both technologies to help you better optimize your network.
The Georgia World Congress Center has upgraded to 802.11ac Meru wireless technology to support thousands of attendees, exhibitors and mobile devices.
We use an IBM System z mainframe and it's time to update some aging tape drives. How big of a difference is there between the tape storage products on the market?
Tape, disk, virtual disk and other storage media all work with my mainframe, but how do I decide which is the best option for storing data?
I want to share a tape drive between the IBM System z mainframe and other IBM systems. Are there prerequisites for tape drive sharing?
Despite finding their way into Gartner Magic Quadrant reports, vendors of NoSQL databases are still in the early-adopter stage with users. Is there a need for NoSQL software in your organization?
Consultant William McKnight talks about the potential uses of in-memory databases and the processing benefits they can provide to organizations.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.