Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
CIOs of the digital technology era understand the business value of rapid, minimally disruptive, low-cost, low-risk change. IT transformation expert Dan Morris makes the case.
In this video, Cloud Technology Partners' Ed Featherston enumerates the benefits and challenges that CIOs are expected to face when implementing machine learning systems.
The CIO and CISO for the state of Wisconsin discuss how public and private partnerships have become integral to their statewide cybersecurity strategy.
In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against network security threats.
In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data breaches in healthcare.
In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity in terms of mathematics.
Today's sophisticated network security technologies work together to provide a tighter net and block malicious behavior both within and at the edge of the network.
The Ericsson-Cisco partnership is likely to produce little in the way of sales or technology, as carriers wait to rearchitect networks for 5G broadband.
This week, bloggers explore SaaS SIEM, applications as drivers of hybrid cloud, and the benefits and drawbacks of integrated systems.
Enterprises that rent racks inside one of the many data centers that have changed hands in 2017 should carefully evaluate changes to connectivity options, service and prices.
Some organizations require real-time support for critical applications that run on Linux. What are some options to achieve that on a SUSE distribution?
Vendors are keen to push their own server management tools with extra capabilities, but they lack the cross-vendor capabilities provided by Redfish's open standards.
It started as a messaging bus, handling LinkedIn's big data. Now, Kafka streaming underpins a wide industry effort. In a Q&A, Confluent CTO Neha Narkhede marks the path of Kafka.
In many organizations, chief data officer jobs centered on defense against risk are giving way to ones emphasizing innovation. To do so, CDOs must nurture a data culture, MIT panelists said.
Organizations with big data environments are starting to prepare data for analysis before making it available to data scientists and other users, instead of leaving the work to them.