Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
As businesses increasingly embrace technology as a strategic advantage, IT career advancement will rely on tech professionals' untapped skills as they strive for management roles.
The hype around 5G technology is crazy. That doesn't mean CIOs shouldn't get ready for it. Also: Google cracks SHA-1; Ryzen arrives; Yahoo discounted.
In this SearchCIO video, John Viglione, former CTO and current EVP at Vertex Incorporated, offers advice on becoming a board member.
Google's Project Wycheproof tests crypto libraries for known vulnerabilities, but there are potential drawbacks to this tool. Expert Matthew Pascucci explains them.
Scanning IPv6 addresses can be made easy with DNS reverse mapping. In part two of this series, expert Fernando Gont explains how this technique can be exploited and mitigated.
Experts say codifying the Vulnerability Equities Process into law would increase transparency and trust regarding vulnerability disclosure by the government.
ARRIS plans to buy a portion of the Brocade networking portfolio that includes Ruckus Wireless. ARRIS is expected to target large public venues, education and hospitality.
Enterprise spending on public cloud service providers will increase almost 22% annually through 2020, depressing sales of data center switches from Cisco and other suppliers.
The single pane of glass, unified network management system is often thought to be a myth. But in the age of cloud computing, a viable framework is beginning to emerge.
Azure Stack will have a fourth appliance option when it becomes generally available later this year, but questions about pricing continue to emerge.
A converged system's appeal comes from having an optimized platform that removes significant complexity from an IT environment. But when is CI the right move to make?
Converged and hyper-converged systems simplify an IT environment and boost performance. Here's how to decide if they are right for your business's data center.
Moving custom Spark and Hadoop pilot projects into production use has proved daunting. But container technology eased the transition at the Advisory Board analytics service.
Big data architectures are complicating the data integration process for more and more IT teams, driving them to hit the gas on efforts to expand their integration capabilities.
Effective metadata management processes can prevent analytics teams working in data lakes from creating inconsistencies that skew the results of big data analytics applications.