Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
This month's cyberattacks clearly show the cost of skimping on cybersecurity. Unfortunately, the ROI for ample IT security is not as transparent for some companies, MIT's Michael Siegel explains.
Lots of accomplished people feel like frauds -- and that can get in the way of success. An IT pro shares his experience and the tools to move on.
Trump administration 'cyber czar' Rob Joyce outlined how the government plans to combat cybersecurity gaps at an event in Boston.
The widespread use of SSH keys is posing security risks for enterprises due to poor tracking and management. Expert Michael Cobb explains how to regain control over SSH.
Android apps infected with Gooligan malware enable attackers to compromise the security of Google accounts. Expert Nick Lewis explains how users can protect themselves.
Using threat intelligence tools can help your enterprise stay one step ahead of attackers and possible threats. Learn how threat intelligence can be used in your company.
Read this edge router review to learn what capabilities current product lines now offer, which are essential for your particular network and what questions to ask vendors.
Buying routers is more complicated than ever. This handbook on edge routers includes an overview of the latest capabilities to help you decide which you need.
Aerohive Connect, a low-cost management option for small WLANs, is available across the vendor's access points and switches. Aerohive also cut hardware prices by as much as $600.
A lack of open source development support adds to enterprise OpenStack criticism, as the platform inches forward with traditional IT customers and partners.
Despite a rapidly changing IT industry driven mostly by cloud, the on-premises data center is here to stay, according to a survey by the Uptime Institute.
A major change in SUSE Manager 3 is that it's primarily built on Salt, rather than Spacewalk. Learn what else has changed, and how IT can take advantage of the latest release.
The growing use of mobile devices by business users broadens the risk of data inconsistencies, a hazard that an integrated process for managing metadata and master data can help address.
Operational data stores and data warehouses both store operational data, but the similarities between them end there -- and they both have a role to play in analytics architectures.
Kafka is a linchpin in many on-premises data pipelines. Now, Confluent has a Kafka cloud service to ease this distributed system's ascent to cloud nirvana.