Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
The Royal Hospital Chelsea is a retirement and nursing home for disabled or elderly servicemen. Home to around 300 armed forces veterans, both men and women, it was founded by King Charles II in the 17th Century and its buildings were designed by Sir Christopher Wren.
Use these free RFP template examples for ERP to make the best use of your business' technology resources.
This app's for you: The future of mobile personalization goes way beyond a recommendation for the next movie to watch or the closest pizza joint. But, the wonder of super-targeted apps has its creepy side too.
Medical and pharmaceutical researchers wrestle with finding meaning in big data variety and find that technology alone is still not up the task.
Corporate boards have increased their awareness of security issues, but experts say they still lack information security principles.
Preview: At Black Hat USA, Point-of-Sale expert Nir Valtman will demonstrate new attacks designed to break point-of-sale security.
Video: Insider threats expert Randy Trzeciak explains why non-malicious insiders, particularly developers, pose as much risk to an enterprise as intentionally malicious insiders.
To respond to increased cyberthreats, enterprises need to form their network's security plan around the idea of pervasive protection, which is based on the notion of a centrally managed security system.
The new IT landscape is more virtual, distributed and increasingly mobile. It's more interconnected with applications talking to each other. Threats are evolving and so is regulatory pressure. All of this creates security compliance challenges.
Pervasive protection encompasses risk management, forensics, identity authentication and risk management to provide a centralized approach to security management that protects your enterprise network in a modern IT landscape.
Isolated, dedicated grounds, telecom grounds -- the performance and, more importantly, safety of data center equipment -- rely on proper grounding.
No mechanical refrigeration or dehumidification. No war between IT and facilities. Hear how Facebook's choices yield a PUE consistently below 1.10.
Find judging criteria and category descriptions here for the 2014 Modern Infrastructure Impact Awards.
At the TDWI Executive Summit in Boston, users talked about the benefits and challenges of incorporating the Agile methodologies long practiced in development circles into data warehouse and business intelligence projects.
The number of NoSQL database options is vast, and distinct product categories occupy separate niches. That makes it imperative to understand what works best for specific applications when evaluating NoSQL software.
In this episode of the Talking Data podcast, the editors review happenings at the recent MongoDB World event. Apt use cases for this NoSQL-style database were discussed.