Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices, Blockchain
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
A recent article on biological malware got Niel Nickolaisen thinking about how to minimize security risks in emerging tech. Here are two approaches that will help.
Why does IT exist? In the second part of his essay on the evolution of IT, George Spalding makes the case for value transformation and explains the role of DevOps in making it happen.
In 2003, we were told IT didn't matter and posed a risk to the business. CIOs have been reacting to those alarums ever since. It's time for a change, says this ITSM expert.
Danish shipping giant AP Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.
iOS 11 will allow users to avoid authorities attempting to force smartphone access by temporarily disabling biometric unlocking of mobile devices.
CrashOverride malware targets industrial control systems and can wreak havoc. Expert Judith Myerson explains the capabilities of the malware and what to do to stop it.
ManageEngine launches OpManager Plus, a new deep packet inspection tool; Nyansa broadens analytics for Voyance; and Aerohive premieres a new combined switch-access point.
The key to selecting the network security product that will work best for your organization is choosing tools that will work together as a unified security strategy.
Data center operators are beginning to use modified link-state protocols on their large-scale data center fabrics, according to the IETF. What's behind the switch?
Because the Uptime Institute focuses primarily on power and cooling, alternative data center certifications have emerged. Their chances of replacing Uptime, however, seem slim.
Blockchain mostly runs in the cloud today, but some hardware vendors have considered how it might fit into the data center -- despite the few benefits that it will create.
To ensure your mainframe is fault-tolerant, resilient and ready to support a growing number of apps, follow these best practices for hardware allocation, automation and more.
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds.
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data.
Data management startup Dremio has aimed its Apache Arrow expertise at the problem of self-service data delivery. In-column caches and optimization speed queries across varied data stores.