Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs-6 Next

An evergreen topic of conversation is the security and privacy of corporate infrastructure and data.

So, what exactly do top technology executives talk about when everyone is listening? A mix of technology and business topics made this year’s list of the Logicalis Top 10 Tech Trends to Watch for 2011, the company’s second annual study of the social media conversations of top IT executives. Conducted by Logicalis, an international provider of integrated information and communications technology (ICT) solutions and services, chief information officers (CIOs) and chief technology officers (CTOs) are using social networking to discuss more than the hottest technology trends. As popular social media tools mature, IT professionals are also using them to discuss business and management issues that can impact the way they run their organizations, as well as job and career issues.

More Slideshows:


IT Certifications Around the World — Differences in Numbers and Popularity Open your global mind, so you can make a smarter decision toward your next certification.

Top Ten Best Practices for Data Integration Use these guidelines to help you achieve more modern, high-value and diverse uses of DI tools and techniques.


The Information Governance Conundrum – Seeking an Answer to Information Overload While "rigorous discovery" and defensible disposal of information is the most powerful outcome of information governance efforts, very few are able to effectively dispose of data.

 
 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.