Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Top 10 Tech Trends to Watch in 2011 According to CIOs, CTOs-6 Next

An evergreen topic of conversation is the security and privacy of corporate infrastructure and data.

So, what exactly do top technology executives talk about when everyone is listening? A mix of technology and business topics made this year’s list of the Logicalis Top 10 Tech Trends to Watch for 2011, the company’s second annual study of the social media conversations of top IT executives. Conducted by Logicalis, an international provider of integrated information and communications technology (ICT) solutions and services, chief information officers (CIOs) and chief technology officers (CTOs) are using social networking to discuss more than the hottest technology trends. As popular social media tools mature, IT professionals are also using them to discuss business and management issues that can impact the way they run their organizations, as well as job and career issues.

More Slideshows:

IT Certifications Around the World — Differences in Numbers and Popularity Open your global mind, so you can make a smarter decision toward your next certification.

Top Ten Best Practices for Data Integration Use these guidelines to help you achieve more modern, high-value and diverse uses of DI tools and techniques.

The Information Governance Conundrum – Seeking an Answer to Information Overload While "rigorous discovery" and defensible disposal of information is the most powerful outcome of information governance efforts, very few are able to effectively dispose of data.

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.