Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Medical and pharmaceutical researchers wrestle with finding meaning in big data variety and find that technology alone is still not up the task.
Is your IT service provider management strategy sufficient to tackle the cloud, SaaS and other vendor-dependent technologies? Review our recent CIO coverage and take our quiz to find out.
Uber is shaking up the taxi business, but it isn't the only mobile disruptor out there. We haven't begun to fathom the changes mobile will bring, say some Boston gurus. Plus, Dropbox lures workers and Facebook imitates Vegas in Searchlight.
Expert Nick Lewis explains how to keep call center employees from getting duped by social engineering scams and pretexting.
News roundup: The revelation of potential iOS backdoors -- and Apple's perceived acknowledgement of them -- has sparked debate over the definition of a backdoor and raised concerns over iOS security.
Learn about the tools and services available that enterprises can use to determine the security of their third-party applications.
Integrating OpenStack within your existing data network takes some careful planning, but there are plenty of tools to help.
SN blogs: This week, analysts discuss how to prepare your network infrastructure to handle big data, the cost benefits of 3-D printing and what it means to have a hyper-converged network.
There are lots of technical approaches to sifting applications out of the sand pile of network traffic, but when you get down to the details, the best solutions all do it the same way: with deep packet inspection, writes Patrick Hubbard.
No mechanical refrigeration or dehumidification. No war between IT and facilities. Hear how Facebook's choices yield a PUE consistently below 1.10.
Find judging criteria and category descriptions here for the 2014 Modern Infrastructure Impact Awards.
Did you miss what happened at Dell, IBM and other major tech vendors so far in 2014? Here are the top five data center news stories to keep you in the loop.
In this episode of the Talking Data podcast, the editors review happenings at the recent MongoDB World event. Apt use cases for this NoSQL-style database were discussed.
The train to NoSQL rode the rails of agility and scalability, according to Dwight Merriman, MongoDB co-founder.
Long-time IT watcher Tom Davenport sees potential in the latest big data go-around, with enterprise Hadoop part of the mix.