Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Organizations look to encryption as a foolproof way of securing cloud information. But making the data unreadable to unauthorized users doesn't protect data from everything.
Organizations from the New England Patriots to small municipalities are tapping mobility as a foundational technology for improving customer experience.
HP Inc. CTO Shane Wall weighs in on three big macro trends that are shaping the company's long-horizon strategy.
The FBI confirmed many state voter databases have been scanned or attacked by malicious actors and urged states to ensure security is in place and ready.
Many large enterprises have their own internal public key infrastructure. Expert Michael Cobb explains the considerations organizations should make before undertaking the task.
Expert Dan Sullivan explores how the Cybereason Detection and Response Platform uses big data security analytics to identify malicious events and better secure enterprises.
The latest IEEE Ethernet standard gets more life out of CAT5e and CAT6 cables by raising bandwidth from 1 Gbps to as much as 5 Gbps.
ICYMI: Talari survey studies the cost of network outages, ARM introduces a chip interconnect system and a study indicates that phishing attacks are taking aim at system files.
This week, bloggers look into ExtraHop continuous packet capture, Oracle's cloud computing goals and the breach at Yahoo.
Moving servers off premises to a colocation facility can be a daunting task. Use these best practices to minimize downtime to ensure a seamless transition.
Virtual machines can now run on the edge, near the things at the center of the internet of things, making use of multiple applications outside the data center.
Learn how to use Btrfs snapshots with Linux utilities, such as Snapper and GRUB2, to revert back to previous states in the event of a configuration mishap.
Among a handful of new SQL-oriented, in-memory databases is MemSQL. Recent product updates are meant to improve data pipeline creation and performance in high-speed ingestion apps.
Expert John Ladley examines the leading data governance software products, comparing and contrasting their features to help you determine which tool will best meet your needs.
With Data3Sixty's cloud-based grow-as-you-go subscription model, organizations don't have to invest in a major data governance implementation or worry about complex upgrades.