Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics, IT in the Middle East
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
The new data transfer agreement between the U.S. and the European Union has its detractors, but industry observers say, 'Give it a chance.'
IT leaders are adding more security layers in an effort to protect against mobility threats. What tools are in their portfolios?
Don't blow a fuse when scaling your business. Culture, leadership and organizational structure need to change as your startup grows.
Dell's Brett Hansen discusses his company's new approach to advanced threat protection, which leaves behind signature-based detection and embraces machine learning.
Writing can be one of the best ways to establish your reputation as an infosec professional. Expert Joshua Wright of the SANS Institute explains the best ways to do it.
Advanced persistent threats are a constant risk for enterprises, so the board needs to know about them. Expert Mike O. Villegas discusses how to effectively communicate about APTs.
The cost of Ethernet networking will fall to a fifth of the current level in four years, a research firm said. At the same time, bandwidth usage will soar.
This week, bloggers look at Cisco's shift from CLI, Savvius' packet capture appliance and cybersecurity as a vertical industry.
A10 has acquired Appcito to improve its portfolio of ADC services for enterprises adopting cloud computing.
Whether you use mainframes or the cloud, data center capacity planning remains critical to ensure you have the IT resources you need down the road.
The density and flexibility offered by blade servers make them increasingly popular for IT pros inside an enterprise data center.
While the KVM functionality in Red Hat Enterprise Linux can help admins manage VMs on a few servers, larger deployments may call for RHEV and OpenStack.
Omni-Gen from Information Builders features a variety of tools for enterprise data management, data governance and data best practices, all in one centralized package.
How to balance data safety with innovative big data expansion was at issue at an MIT symposium where the chief data officer role was considered.
DBAs can use the Dell Toad product suite for managing database structural performance and Dell Foglight to proactively monitor SQL, storage and virtualization performance.