Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Microsoft's Windows 10 Enterprise makes Windows 8 seem like a distant memory. But should CIOs wait or take the bait? Also in Searchlight, Google uses sensors to fight pollution; Intel's new memory chip breakthrough.
Artificial intelligence has come a long way since SearchCIO columnist Harvey Koeppel studied with some of the discipline's pioneers. He offers 10 steps CIOs must take now to prepare for the AI technology era ahead.
How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.
Expert Karen Scarfone examines the top wireless intrusion prevention systems (WIPS) to help readers determine which may be best for them.
News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices.
Security pros are too stretched to digest actionable intelligence on a continuous basis. Dedicated appliances may help ease their load.
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches.
Horror stories in the consumer market have cast a shadow over the Internet of Things. Are enterprise IoT deployments even more at risk?
Enterprises want to drop costly MPLS links but hesitate to lose the control they provide. SD-WAN offers a solution, and WAN optimization brings it to life.
The tenets of traditional IT -- well-tended data center hardware, owned software deployments -- are falling away in the cloud era of standardization and orchestration.
New security features and predictive analysis of performance issues are two of the new features users will find in RHEL 6.7.
Learn how organizations make big data decisions, and if their loyalty lies with the same vendor.
Database pioneer Michael Stonebraker told an MIT conference that data curation tools offer a step forward on data integration. Others said things are already progressing through other means.
Implementing an effective data integration strategy is becoming increasingly important as organizations look to collect and analyze information from a diverse set of data sources.
The Redis open source DBMS provides a highly scalable data store that can be shared by multiple processes, applications or servers.