Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
How do organizations gain a competitive edge in today's rapidly evolving tech landscape? With a solid IT strategy plan to guide them, for starters. These IT strategy plan templates and samples will help.
Is data monetization the new gold rush? CEOs and boards of directors think so, and they are looking to CIOs to strike it rich.
Chief data officers make the case why organizations need them; watch out CIOs: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium.
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
Threat intelligence takes data from multiple sources and turns it into actionable, contextual information. Expert Ed Tittel takes a look at the top threat intelligence services.
Swiss research group modzero disclosed a vulnerability that enabled remote attacks on Xceedium's Xsuite privileged access manager.
NetScout plans to incorporate security in monitoring; Barracuda upgrades ADCs; and Riverbed improves SteelHead.
The sound of mooing and the smell of diesel fuel are just part of what makes wiring a farm for networking a special experience.
Juniper Networks is selling to more enterprises, a trend that could heat up the competition for the wallets of tech buyers.
Learn how organizations make big data decisions, and if their loyalty lies with the same vendor.
There are ways to combine DCIM and ITSM systems in the data center that give even better visibility.
The right DCIM tool isn't the one with the most data points, but rather the one that best synthesizes data into useful information for IT, ops and facilities teams.
Riak NoSQL DBMS is designed to enable storage of and access to various types of unstructured data that require continuous availability.
Quest 2.0 is an upgraded query engine and data integration platform from Metanautix. Its designers helped create Google Dremel, a herald of sorts for several new big data query tools.
Developers, database administrators and DevOps teams use MySQL open source RDBMS to build and manage next-generation Web- and cloud-based applications.