Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation, Microservices, Blockchain
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS, DevOps, Converged infrastructure, Containers
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage, Object storage, Storage performance
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
In the future, IT infrastructure will be so seamless, the business won't even know it's there. That's the CIO vision of David Giambruno.
The stellar scores of the top two cloud providers in this year's Gartner ranking reflect tremendous innovation, says analyst Elias Khnaser.
Steady progress in building quantum machines, backed by billions in investment dollars, is bringing quantum computing's thorny problems tantalizingly close to resolution.
DoubleAgent malware is a proof of concept for a zero-day vulnerability that can turn antivirus tools into attack vectors. Expert Nick Lewis explains how to contain the threat.
New ransomware variants have introduced another threat to enterprises. Rob Shapland explains what destruction of service attacks are and how organizations should prepare for them.
Experts and Apple say despite the leak of the iPhone Secure Enclave Processor encryption key that can be used to decrypt firmware code, user data and biometric information are still safe.
The Cisco-Springpath acquisition places crucial HyperFlex technology under the networking vendor.
Intent-based networking systems could redefine how enterprise networks are managed. But to be successful, these systems must deliver, and not just promise.
Top-line Cisco revenues fell in the July quarter, as the company's legacy switching business continued to weaken. Cisco could soon reach two straight years of revenue declines.
Cisco's purchase of Springpath could open the door to further use of hyper-converged software across the Cisco portfolio, including in its Unified Computing System.
The expanding role of NVDIMM and DRAM and the emergence of software-defined memory will bring more flexibility to enterprise data centers -- but not without some challenges.
DCIM software addresses a diverse range of data center needs and functions. Learn about the vendors in the market and the accompanying specialties and functions that they offer.
As companies distribute data across various platforms, they may need to pay more attention to securing it in databases and other repositories where security is far from baked in.
Changes in data management processes -- including self-service data preparation, data lakes and real-time analytics -- create a new landscape in companies, according to analyst Matt Aslett.
Data management teams are asking more questions about data security, Gartner analyst Merv Adrian says in a Q&A. But new factors are complicating the process of securing databases, he adds.