Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
CIOs of the digital technology era understand the business value of rapid, minimally disruptive, low-cost, low-risk change. IT transformation expert Dan Morris makes the case.
In this video, Cloud Technology Partners' Ed Featherston enumerates the benefits and challenges that CIOs are expected to face when implementing machine learning systems.
The CIO and CISO for the state of Wisconsin discuss how public and private partnerships have become integral to their statewide cybersecurity strategy.
Facebook's Alex Stamos used his Black Hat 2017 keynote to address a wide variety of issues, including defensive security research and diversity in the infosec community.
Long a conference that has thrived on technical sophistication and nuanced attacks, Black Hat USA 2017 in Las Vegas also found room for softer themes.
Vulnerabilities in Java and Python have opened them up to possible FTP injections. Expert Nick Lewis explains how enterprises can mitigate these attacks.
Savvius Spotlight, a new network traffic monitoring tool, launches; ManageEngine boosts its endpoint monitoring; and Cisco forecasts 'destruction-of-service' attacks.
The latest update to the Mist Wi-Fi management platform makes it more useful for divvying up network access in hotels, college dormitories and apartment buildings.
This month's Network Innovation Award goes to Arista Universal Spine and the technology behind the architecture.
IBM's Strategic Imperatives are slowly morphing the server hardware stalwart into a software and services company. But IBM still needs hardware to complete the transformation.
Enterprises that rent racks inside one of the many data centers that have changed hands in 2017 should carefully evaluate changes to connectivity options, service and prices.
Some organizations require real-time support for critical applications that run on Linux. What are some options to achieve that on a SUSE distribution?
It started as a messaging bus, handling LinkedIn's big data. Now, Kafka streaming underpins a wide industry effort. In a Q&A, Confluent CTO Neha Narkhede marks the path of Kafka.
In many organizations, chief data officer jobs centered on defense against risk are giving way to ones emphasizing innovation. To do so, CDOs must nurture a data culture, MIT panelists said.
Organizations with big data environments are starting to prepare data for analysis before making it available to data scientists and other users, instead of leaving the work to them.