Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics, IT in the Middle East
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
The systems that will form the backbone of future business applications will be available in the cloud, says consultant Judith Hurwitz.
Today's programming models are things of the past, says consultant Judith Hurwitz. Cognitive computing systems use data to devise applications that reflect the world as we see it.
Shawn Wiora, CIO at Creative Solutions in Healthcare, pursued an end-to-end cloud strategy, which resulted in improved security, better performance and IT cultural transformation.
Many organizations use a risk-based framework to help manage their cybersecurity program. Expert Mike O. Villegas discusses the development and benefits of current frameworks.
Branded vulnerability marketing, such as in the case of Badlock, can raise challenges for responsible disclosure. Expert Nick Lewis explains the problems it creates.
New reports suggest that Intel may be looking into selling off its security business and experts are unclear on whether it means Intel's McAfee acquisition has gone sour.
A network engineer job description will vary. Primarily, it depends on whether the job focuses on engineering a new network or on running a network that already exists.
SolarWinds NPM system supports a wide range of features, among them data flow collection, server and application monitoring, and quality of service for enterprise VoIP suites.
SevOne monitoring products, such as the Performance Application Solution, scale to the environment size. The PAS appliance can monitor up to 200,000 network devices.
When it comes to Linux data center tools, there is no shortage of options. For automation, backup and monitoring, consider these five Linux tools first.
VMware made its name virtualizing servers and later with other proprietary technology, but it's reaching out to developers with its container-friendly, open source Project Photon.
Handing off most of its software business to private equity firms is one more step toward Dell's mega-purchase of EMC, and it gives users both clarity and concerns.
DataStax Enterprise 5.0 couples a Cassandra store with a version of the open source Titan graph DB. The goal is fast analytics closely tied to fast transactions.
Not every tool can resolve every problem, so understanding the cause of the bottleneck can help you determine which of these database performance management tools to consider.
Even if you can identify with the use cases presented here, it's important your organization is well-prepared to deploy the software it buys.