Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Data Breach Incident Management and Recovery, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms
ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Is your organization better suited to build, buy or blend its big data architecture? Discuss with SearchCIO during #CIOChat Wednesday, Sept. 24, at 3 p.m. EDT.
Constant changes in the IT industry mean certain tech skills are falling by the wayside. In this tweet chat recap, find out which skills you should hone to move up the ranks.
In this Ask the Expert, analysts James Staten of Forrester Research and Kyle Hilgendorf of Gartner Inc. talk about how the majority of companies don't have a cloud architect, but should.
In the wake of the iCloud celebrity photo hack, expert Keith Palmgren offers advice on how to build more effective passwords and avoid easy data breaches.
Starting the insider threat detection process when hiring new staff members can put your company ahead of the curve. Expert Joe Granneman explains what to look for to prevent insider threats.
The defense-in-depth security model is often touted as a must for enterprises, but research shows that security products often fail to do what they're supposed to.
An expert explains why the adoption rate of IPv6 isn't as slow as people think and why it is important to create a dual-stack environment during the protocol shift.
Cisco Sourcefire-ASA integration creates a next-generation firewall with IPS and advanced threat protection built in. The integration also ties ASA firewalls to Sourcefire's endpoint security product.
Juniper closes the gap between detection and security enforcement by linking its threat intelligence platform to its SRX firewall series.
There's a lot of hype about continuous deployment in DevOps circles, but it can be disastrous if the right culture and organization aren't in place.
GPUs offload the burden of demanding computational tasks from central processors. Integrate GPU into enterprise servers to manage intense computing.
It's time to knock down those silos, one by one. IT is transforming from a siloed set of reactive cost centers into a service provider with a focus on helping the business compete.
New technology is giving personnel departments a bigger role in building the business -- helping them hire and retain people with the right skills.
NoSQL stalwart MarkLogic's database has grown to include many SQL database-style features. Next up is JSON.
Hadoop buzz dimmed down during summer's dog days. Its old pal MapReduce is somewhat to blame.