Topics
- All
- Linux (107)
- Security (42)
- Data Centers (15)
- Ipad (14)
- Pcs (13)
- Cloud (11)
- Networking (11)
- Apple (10)
- Iphone (9)
- Leadership (9)
- Open Source (9)
- Operating Systems (8)
- Web Development (8)
- After Hours (7)
- Windows (6)
- Cisco (5)
- Hardware (5)
- Nasa / Space (5)
- Software (5)
- Broadband (4)
- Ios (4)
- Laptops (4)
- Social Enterprise (4)
- Apps (3)
- Browser (3)
- Collaboration (3)
- Enterprise Software (3)
- Government (3)
- It Policies (3)
- Privacy (3)
- Project Management (3)
- Storage (3)
- Banking (2)
- Diy (2)
- Education (2)
- Emerging Tech (2)
- Malware (2)
- Servers (2)
- Software Development (2)
- Tablets (2)
- Virtualization (2)
- Big Data (1)
- Business Intelligence (1)
- Disaster Recovery (1)
- E-Commerce (1)
- Google Apps (1)
- Health (1)
- It Employment (1)
- Outage (1)
- Printers (1)
- Processors (1)
- Smartphones (1)
- Windows 8 (1)
Content Types
About 372 results
-
[Infographic] Wiretapping: Privacy vs. security
This infographic traces the history of the privacy vs. security debate in the U.S. from the Bill of Rights to PRISM.
-
Apple's new Mac Pro desktop: First look
Here is a just-the-facts look at the Mac Pro desktop, announced at Apple's WWDC event, with links to galleries and a roundup of other news.
-
Infographic: The life cycle of a server
Servers don't live that long, so what happens to them when their work is done? Check out this infographic's numbers on data center servers and their average lifespan.
-
Infographic: It's a SaaS world
Get a quick look at the history of SaaS, how it's growing, and what makes it different from other software delivery methods.
-
CTO Tate Cantrell: Building 21st century data centers
CTO Tate Cantrell of Verne Global answers questions about building data centers with renewable power resources and the latest design features.
-
Arch-based Manjaro Linux touts user-friendliness
Looking for a new Linux flavor to try? The Manjaro team targets newcomers and pros alike, promising ease-of-use and performance.
-
Infographic: Awesome data centers
This infographic from Whoishostingthis.com offers some statistics on the world's largest data centers.
-
Surveys: Aid security research by sharing your experience
These two security surveys are aimed at IT pros who can contribute their experience and opinions to research topics focused on security effectiveness in their organizations.
-
Data center power consumption: How much energy do you need?
Huge shifts in data center technology may have you scrambling to calculate costs and decide between on-premise and cloud options. Don't forget to factor in your power needs with ou...
-
Infographic: Software Defined Networking revolution
This infographic presents some predictions for the growth of Software Defined Networks, presented by the Open Networking Summit.
-
Secure your code: iOS is rich target for spying software
The popularity of Apple devices makes them a prime target for spying programs, malware, and simple thievery.
-
Better than BackTrack? Kali Linux offers new brand of pen-testing tools
BackTrack Linux no more. The popular open source package of penetration testing tools now has a new platform and a new name.
-
Send us your shiny data center pictures
Share your pictures of data centers that showcase the latest hardware, new technology, or an outstanding design.
-
Infographic: The death of packaged software
This infographic from Engine Yard presents some fascinating statistics on the death of packaged software and the era of everything-as-a-service.
-
Crypton for developers: Toward cryptographically-secure cloud apps
A new open source project called Crypton hopes to put a reusable cryptographic solution in the hands of cloud app developers, providing easy, built-in encryption of user data.
-
Download free ebook on SaaS from TechRepublic
TechRepublic and ZDNet have teamed up for a month of special coverage on SaaS issues, including a free ebook on best practices.
-
PicUntu: Tiny, powerful Linux distro for mini-PCs
In the world of tiny Linux, another pipsqueak checks in: PicUntu, based on Ubuntu Qantal 12.10, will run complex computer tasks at no more than 10W.
-
Top 10 Enterprise Cloud posts for 2012
Here are the most-read posts of the year in Enterprise Cloud. Readers wanted to know which cloud services are best and how cloud tech will change IT.
-
Top 10 posts in IT Security for 2012
Here are the most read posts of the year in IT Security.
-
Top 10 Web Designer posts of 2012
Here are the most-read posts in Web Designer for 2012.
-
Top 10 posts in Data Center for 2012
Readers were learning all about Windows 8 and Windows Server 2012 this year, as reflected in the most-read posts of the year.
-
An open source holiday card to share
Here is a fun, interactive open source holiday card that you can modify and share with friends, courtesy of Protecode.
-
Top 10 Apple posts for 2012
Here are the most-read posts of the year for Apple in the Enterprise.
-
Top 10 Linux and open source posts for 2012
Here are the most-read posts for the Linux and Open Source blog in 2012.
-
Infographic: Security and the Cloud 2012
CloudPassage provides this infographic reflecting the answers of IT pros to its survey about cloud uses and security issues.
-
John McAfee tripped up by the smartphone
The case of John McAfee just gets weirder. Here's how he was tracked down in Guatemala, where he is currently seeking asylum from Belize authorities.
-
Using the power of the cloud as a platform for attack
The battle between cloud service providers and the criminals who would abuse those services to launch attacks on others is well underway.
-
Apple releases firmware update to address Thunderbolt issues
Apple released an update to the Thunderbolt firmware that should address problems users have experienced trying to get bus-powered peripheral devices to work.
-
Infographic: Holiday shopping safety
Remind your organization's users to remain security conscious during the holiday shopping season with this infographic.
-
Researchers find iOS is rich target for spying software
The popularity of Apple devices makes them a prime target for spying programs, malware, and simple thievery.