Search: security

More Results

Sort by: Relevance | Date
  • virtualisation

    In IT, virtualisation is the process of creating logical computing resources from available physical resources. This is accomplished using virtualisation software to create a layer of abstraction between workloads and the underlying physical...

  • VMworld Europe 2011

    Attend VMworld, the IT Industry’s Leading Virtualisation & Cloud Event

    VMworld 2011 offers more than 115 unique breakout...

  • The mainframe is dead, long live the mainframe

    As with Mark Twain, the reports of the death of the mainframe have been exaggerated. From the early 1990s onwards, the mainframe has been portrayed as the dinosaur of computing, being steadily overtaken by more glamorous platforms and newer...

  • Expect More at IP EXPO on 20th & 21st October

    Visit IP EXPO - the only event to cover all aspects of IT in the enterprise and learn how you can Drive Efficiency, Increase Security, Reduce Costs, and Meet Business Needs.

    You can expect:

    • Over 210 free-to-attend seminars across 14...

    • EU Code of Conduct on Data Centres' Energy Efficiency

      The EU Code of Conduct on Data Centres' Energy Efficiency is a voluntary initiative aimed at reducing the environmental, economic, and energy-supply security impact of today's data centres.

    • Security analytics security school quiz

      In this 5-question quiz, test your knowledge of Josh Sokol's Security School lesson on security analytics.

    • IT Decisions 2010

      Find out what's hot on the IT agenda at IT Decisions 2010 (www.itdshow.com), including the latest developments in:

      • Unified Communications & VOIP
      • Virtualisation, Storage & Datacentre...

      • Blackberry Secure Work Space

        BlackBerry Secure Work Space is an option for BlackBerrry Enterprise Service (BES) 10 that allows administrators to secure and manage non-BlackBerry devices through the BES management console.

      • Secure internet routing

        This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.

      • The Cyber Security Summit

        Join the Cabinet Office, Home Office and National Cyber Crime Unit at the Cyber Security Summit, which will examine efforts to reduce vulnerabilities in government systems and tackle cyber...

Search Again: