Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
Here's an important dispatch from Symposium/ITXpo: Digital business innovation is at the heart of the CEO psyche; CIOs need to help.
ERP projects are back on CIO to-do lists. Watch this CIO Minute for some timely advice from CTO Niel Nickolaisen.
In this CIO Minute video, CTO Niel Nickolaisen shares his thoughts on mitigating mobile security risks. Identifying the sources of risk is just the first step.
Expert Dan Sullivan takes a look at how the IBM QRadar Security Intelligence Platform collects data from multiple sources so as to provide a comprehensive view of IT security.
There are an overwhelming number of cybersecurity certifications available, so which one should people just beginning their career start with? Expert Mike O. Villegas answers.
The healthcare industry is a target for ransomware infections. Expert Ernie Hayden explains how organizations can take steps to prevent and respond to these attacks.
The latest version of the Facebook Wedge switch raises the hardware's throughput to 100 Gbps. But the networking gear remains a non-enterprise technology.
Analysts examine how the VMware hybrid cloud announcement pits the vendor against OpenStack and Azure, and they discuss must-have features in an automation RFP.
Learn the difference between a site-to-site VPN and a remote-access VPN, as well as the protocols used for each one.
As colocation providers expand their services, look for companies that offer features you need not just for today, but years down the road. Then, get ready for the big move.
To avoid the disaster recovery safety net, build an IT business continuity plan for your data center. But before you do, weigh the pros and cons of using colocation vs. cloud.
Greater memory and faster chips will better suit VMware's hyper-converged infrastructure for Tier 1 workloads, the company hopes, as its tries to outdo market-leading Nutanix.
Informatica Master Data Management is aimed at helping sales, marketing and customer service teams ensure they're working from the most relevant and accurate data available.
It is still difficult to move existing data warehouse jobs to Hadoop, but helpful tools are emerging. A Hadoop tool known as Cloudera Navigator Optimizer is one.
Effectively governing the data stored in different systems across big data architectures is emerging as one of the keys to a successful deployment of Hadoop and related technologies.