Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
In this book excerpt, authors Andrew Wells and Kathy Chiang detail the decision architecture methodology, describe its five phases and explain how the strategy drives data monetization.
The iteration process promises to save IT and the business precious time. Done wrong, however, it actually adds time, risk, disruption and confusion to projects.
Digital transformation is the magic word at Microsoft these days. What can CIOs anticipate from the company as it organizes itself to reinvent its customers?
Karla Burnett of Stripe presented sobering results of phishing research from her company at Black Hat 2017, suggesting phishing training is ineffective against today's threats.
Expert Ed Tittel examines Sophos Endpoint Protection, an endpoint security platform with antivirus, antimalware and more.
Security researchers at Black Hat 2017 analyzed the Industroyer malware, the attack on Ukraine's power grid and what it means for industrial control system security in the U.S.
A unified network security platform can offer organizations significant savings by helping them to reduce outages and the number of security components being managed.
Savvius Spotlight, a new network traffic monitoring tool, launches; ManageEngine boosts its endpoint monitoring; and Cisco forecasts 'destruction-of-service' attacks.
The latest update to the Mist Wi-Fi management platform makes it more useful for divvying up network access in hotels, college dormitories and apartment buildings.
IBM's Strategic Imperatives are slowly morphing the server hardware stalwart into a software and services company. But IBM still needs hardware to complete the transformation.
Enterprises that rent racks inside one of the many data centers that have changed hands in 2017 should carefully evaluate changes to connectivity options, service and prices.
Some organizations require real-time support for critical applications that run on Linux. What are some options to achieve that on a SUSE distribution?
It started as a messaging bus, handling LinkedIn's big data. Now, Kafka streaming underpins a wide industry effort. In a Q&A, Confluent CTO Neha Narkhede marks the path of Kafka.
In many organizations, chief data officer jobs centered on defense against risk are giving way to ones emphasizing innovation. To do so, CDOs must nurture a data culture, MIT panelists said.
Organizations with big data environments are starting to prepare data for analysis before making it available to data scientists and other users, instead of leaving the work to them.