Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Microsoft's Windows 10 Enterprise makes Windows 8 seem like a distant memory. But should CIOs wait or take the bait? Also in Searchlight, Google uses sensors to fight pollution; Intel's new memory chip breakthrough.
Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's pioneers. He offers 10 steps CIOs must take now to prepare for the AI technology era ahead.
How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.
Major IT companies like Black Hat and Google spoke out against the proposed Wassenaar Arrangement rules for cybersecurity software, and those protests have caused the U.S. Dept. of Commerce to commit to drafting new rules.
News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.
The recently shutdown Darkode cybercriminal community has been rebuilt, and claims the administrators are intact and security will be tightened to better avoid law enforcement.
Big data is big news, but it's also influencing networking pros' capacity planning, according to an Enterprise Management Associates study.
NetScout plans to incorporate security in monitoring; Barracuda upgrades ADCs; and Riverbed improves SteelHead.
The sound of mooing and the smell of diesel fuel are just part of what makes wiring a farm for networking a special experience.
New security features and predictive analysis of performance issues are two of the new features users will find in RHEL 6.7.
Learn how organizations make big data decisions, and if their loyalty lies with the same vendor.
There are ways to combine DCIM and ITSM systems in the data center that give even better visibility.
Database pioneer Michael Stonebraker told an MIT conference that data curation tools offer a step forward on data integration. Others said things are already progressing through other means.
Implementing an effective data integration strategy is becoming increasingly important as organizations look to collect and analyze information from a diverse set of data sources.
The Redis open source DBMS provides a highly scalable data store that can be shared by multiple processes, applications or servers.