Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Robotic process automation challenges the labor arbitrage of offshore outsourcing, sparking a new discussion among vendors, business leaders and CIOs.
In this section of a six-part SearchCIO video series, Sangeet Paul Choudary of Platformation Labs discusses the objectives and prerequisites of platform business models.
AR applications are poised to become an integral part of CIO mobile strategy. Start with tablets and smart phones and be on the lookout for headset breakthroughs.
Google's second Android Security Report revealed changes and upgrades made to the OS. Expert Michael Cobb covers the important takeaways for enterprises.
Election registration databases in two states were attacked and the resulting voter data breach has led to questions of possible election tampering and inadequate state security.
A web shell from the JexBoss security tool was used to exploit servers through an unpatched JBoss vulnerability. Expert Michael Cobb explains how to prevent similar attacks.
To make the right decisions when building your cloud network architecture, metrics and data about user experience and technical attributes are needed.
This week, bloggers look into Citrix's free load balancer, Nutanix's buying spree and cybersecurity predictions.
Check out IP subnetting shortcuts on how to do subnet mask calculations and break down IP address classes to route traffic within your network.
Nginx, HAProxy and Linux Virtual Server are three different Linux load balancer to consider for multiserver, high-traffic requests in the data center.
Blade servers and rack servers aren't designed the same, which means the refresh process varies for each. Explore the different upgrade considerations for memory, storage and more.
Flash storage has reached a crossroads, where lower prices and greater capacity have led a growing number of hyper-converged infrastructure products to include all-flash storage.
Cloud data warehouse offerings from smaller vendors seek to address functionality gaps that bigger players may miss. Newcomer Snowflake Computing targets concurrent queries, for example.
Collibra Data Governance Center is a repository- and workflow-oriented data governance platform that also offers features for data management and data stewardship.
Evaluating and selecting a data governance tool depends on not only features and functionality, but also how you will use the tool to add value to your organization.