Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
A corporate board appointment can give a CIO invaluable perspective on running a business, but to get one, deep expertise and a certain degree of unselfishness are required.
The attack on consumer privacy by new tech is huge and growing, enabled by consumers and greased by profit; in other words, a fait accompli?
The International Institute for Analytics recommends embracing AI, clearly defining roles, and finding a balance between experimentation and deployment.
Researchers found that facial recognition systems can be bypassed with 3D models. Expert Nick Lewis explains how these spoofing attacks work and what can be done to prevent them.
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real-time.
USB storage devices can be turned into covert channels with a software tool called USBee. Expert Nick Lewis explains how to protect your enterprise data from this attack.
Cisco certification changes, effective in January, mean trainees will need to focus more on data center and analytics topics.
Accommodating your legacy equipment when shifting to an SDDC takes a lot of time and careful study. What are some strategies to keep in mind when moving data centers?
Dell is pitching the open networking features of its new campus switches. The hardware's ability to run any of several network operation systems is a market differentiator.
Don't get hung up on data center dimensions in the design phase. Focus on length-to-width ratios to get the most out of data center space, power and cooling.
Understand the three different file system journaling modes for Linux, as well as which mount option provides the best levels of data protection and performance.
Evolving business needs demand a new approach to data center networking. Keep yourself updated on SDN, VXLAN and other technologies with this quiz.
Cambridge Semantics CTO Sean Martin says better scalability can lead to richer representations of data. Such advances are behind the renewed interest in semantic technology.
Choosing the right ETL tool for your data integration requirements can be a challenge. Here's a rundown on what to look for in ETL software and potential vendors to consider.
Ovum analyst Tony Baer discusses machine learning tools, IoT-driven streaming analytics and Hadoop in the cloud, all of which gained attention in 2016, with more likely in store for 2017.