Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
MIT Sloan's Jeanne Ross, speaking to an audience of CIOs, cited vision, action and architecture among the key components of a digital transformation initiative.
SearchCIO asked five speakers at the Fusion CEO-CIO Symposium to talk about the technology-based projects they were most excited about. Watch the video to find out what they had to say.
In this SearchCIO video, Tom Davenport encourages CIOs to take an incremental approach when rolling out cognitive or artificial intelligence technologies.
Researchers discovered the rash of Petya-like attacks are nothing more than a ransomware scam and list files are impossible to restore.
Static source code analysis, along with dynamic analysis and pen testing, can help strengthen your application security. Expert Kevin Beaver goes over the features to look out for.
A new global ransomware attack has been spreading quickly using the same exploits as WannaCry, but researchers have already found ways to protect users from the damage.
The new Cisco DNA Center policy software may become the central enterprise management console for data center and campus networks, integrating Cisco's APIC controller.
With Cisco's Ericsson partnership on hold for now, the Cisco and Apple CEOs hinted at joint work on Wi-Fi and security at Cisco annual customer conference.
Hackers target hardware vulnerabilities in networks, but you can take proactive steps to prevent attacks.
Distributed data center architectures increase IT resiliency compared to traditional single-site models, with networking, data integrity and other factors all playing critical roles.
The latest threat to server security could be the firmware. That's the emphasis of at least one server-maker, hoping to help users thwart new attacks -- and spark server demand.
Admins can use vSphere permissions to assign VM controls to different IT groups within their enterprise. Follow the networking example below to get started.
Big data vendors routinely push the notion of ingesting all of your data into a data lake. But in many cases, doing so is an unnecessary step that could cause ingestion problems.
In a Q&A, DAMA president Sue Geuens talks about the second edition of the group's DMBOK reference book and how data management trends and processes have changed since the first version.
MongoDB has expanded cloud coverage for its Atlas hosted database service, with Azure and Google versions joining an initial AWS-based offering to give users a choice on cloud platforms.