Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Is your company a bystander to the digital economy? Understand the three characteristics of digital goods, says an MIT Sloan professor, and you could be on your way to becoming filthy rich (or better yet, saving the world).
Big data needs better questions; local data concierges might be the next information governance trend; and the downside of data: The Data Mill reports.
In the age of digital businesses, a mobile applications development strategy is a must. Take our quiz to find out how to make the most of mobile apps.
Video: Keith Barker of CBT Nuggets shows how to use VMware ESXi hosts to perform sandbox testing on virtual machines.
Vendors are hurriedly implementing a new patch released over the weekend for the 'Shellshock' Bash vulnerability, but researchers have since found more Bash flaws that will likely need prompt remediation.
Malvertising is already being used by attackers as a delivery mechanism for exploit kits, and new research reveals the problem is likely to get worse, specifically in the form of malicious Flash banners.
Pertino adds several network services apps to its cloud-based WAN, giving IT pros the visibility and control they need over remote access.
SN blogs: October is Cybersecurity Awareness Month. One analyst says the industry should use the time to shed light on the industry's cybersecurity skills shortage.
Cisco Modeling Labs is a network simulator that uses real IOS images. Engineers can design, test and troubleshoot networks in software.
In the old days, all data was created -- and protected -- equally. In today's data center, ever-changing rosters of VMs and LUNs call for a new data backup arsenal.
I want to write a shell script that contains commands for Linux partition creation. Can I automate everything so the user only inputs the partition size and details?
Schneider Electric aims to improve energy efficiency and sustainability. The company's EVP of IT products discusses the future of data centers -- and it's global.
Agriculture, social media, IBM's Watson system and other global topics were discussed at EmTech MIT 2014, with big data wrangling often at the fore.
Consultant Colin White says cloud-based big data systems require the same kind of data management attention as their on-premises counterparts do.
It's hard to pin down exactly what big data is -- and that makes the term almost meaningless, and even cringeworthy, says consultant Rick Sherman.