Search: security

More Results

Sort by: Relevance | Date
  • virtualisation

    In IT, virtualisation is the process of creating logical computing resources from available physical resources. This is accomplished using virtualisation software to create a layer of abstraction between workloads and the underlying physical...

  • VMworld Europe 2011

    Attend VMworld, the IT Industry’s Leading Virtualisation & Cloud Event

    VMworld 2011 offers more than 115 unique breakout...

  • The mainframe is dead, long live the mainframe

    As with Mark Twain, the reports of the death of the mainframe have been exaggerated. From the early 1990s onwards, the mainframe has been portrayed as the dinosaur of computing, being steadily overtaken by more glamorous platforms and newer...

  • metadata security

    Metadata security is the body of practices and policies designed to protect an organization from security risks posed by unauthorized access to information contained in the organization’s...

  • Expect More at IP EXPO on 20th & 21st October

    Visit IP EXPO - the only event to cover all aspects of IT in the enterprise and learn how you can Drive Efficiency, Increase Security, Reduce Costs, and Meet Business Needs.

    You can expect:

    • Over...

    • PCI security council publishes security awareness guide

      The PCI security council has published a guide to help organisations better educate employees on information security

    • EU Code of Conduct on Data Centres' Energy Efficiency

      The EU Code of Conduct on Data Centres' Energy Efficiency is a voluntary initiative aimed at reducing the environmental, economic, and energy-supply security impact of today's data centres.

    • Secure Sockets Layer (SSL)

      The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication, client authentication and encrypted communication between servers and clients.

    • IT Decisions 2010

      Find out what's hot on the IT agenda at IT Decisions 2010 (www.itdshow.com), including the latest developments in:

      • Unified Communications & VOIP
      • Security Visualisation

        This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. Although this example is based on the output of an automated vulnerability scanner...

Search Again: