Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Mobile strategies that build strong customer relationships aim to make the offline world a better place. Here are six ways businesses are doing that.
Malcolm Gladwell talks attitude, marketers address the importance of data quality and the Grammy Awards set guidelines for social media: The Data Mill reports.
Recent data shows that more than 50% of all networking devices are aging or obsolete and pose a security risk to the enterprise. Expert Kevin Beaver discusses how to factor device age into a security risk assessment.
The Bitcoin market is maturing but security issues, such as private key management, persist. The Bitcoin Foundation gives the good news and bad news regarding Bitcoin security.
News roundup: Rogue cell phone towers are popping up across the United States, heightening enterprise communication and data privacy concerns. Plus: Goodwill breach update; Adobe patches released; and security in 2025.
The stadium Wi-Fi network that NFL coaches have been complaining about is based on Cisco wireless LAN infrastructure. The new network has been erratic, making coaches' Surface tablets useless at times.
Server virtualization offers network managers many advantages -- but those benefits come with some stiff challenges.
SN blogs: Enterprises are using third-party providers to handle their mobility management needs; why aren't companies protecting mobile data?
Sysadmins need to ensure their Linux servers perform properly. Check out these tips for choosing the right tool for the job, preventing rootkit attacks and more.
There's a lot of hype about continuous deployment in DevOps circles, but it can be disastrous if the right culture and organization aren't in place.
GPUs offload the burden of demanding computational tasks from central processors. Integrate GPU into enterprise servers to manage intense computing.
New technology is giving personnel departments a bigger role in building the business -- helping them hire and retain people with the right skills.
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
Hadoop buzz dimmed down during summer's dog days. Its old pal MapReduce is somewhat to blame.