- Business Activity Monitoring
- Business Performance Management
- Data Mining
- Real-time Analytics
- Supply Chain Intelligence
- Business Intelligence Software
- CRM Analytics
- Customer Data Integration
Operating systems, Open source, Windows, Developer, Mobile, Database, Business applications, SOA, Web, Middleware, BI, Virtualisation, Collaboration, Licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
DR/security, Green IT, Data centre backup power and power distribution, Data centre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Data centre capacity planning, Server and OS, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Information technology in Poland, Information technology in Russia, Information technology in Turkey, Information technology in Italy, Information technology in Spain, Information technology in France, Information technology (IT) in Germany, Information technology in the Nordics, IT in the Middle East
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Business Activity Monitoring | Business Performance Management | Data Mining | Real-time Analytics | Business Intelligence Software | CRM | CRM Analytics | Customer Data Integration | Customer Data Management | Data Warehouse Software | Decision Support Databases | Decision Support Systems | Demographic Profiles | Executive Information Systems | Industrial Espionage | Knowledge Management | Knowledge Management Software | Market Research
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
IT leaders are adding more security layers in an effort to protect against mobility threats. What tools are in their portfolios?
Don't blow a fuse when scaling your business. Culture, leadership and organizational structure need to change as your startup grows.
CIOs have a part to play in adopting the enhanced data transfer pact. Also in Searchlight: Survey says majority of companies not ready for digital business; Dell-EMC merger is close to done.
America's National Institute for Standards and Technology is advising the deprecation of using SMS-based two-factor authentication in order to improve security.
Hiring an ex-hacker to join an enterprise security team is a risky move. Expert Mike O. Villegas discusses the potential benefits and drawbacks of this nontraditional hiring move.
Building an effective application security program can be daunting. Sean Martin talks with experts about the best first steps enterprises should take.
Ransomware and data breaches may be getting all the headlines, but denial-of-service attacks are on the rise. What can you do to mitigate their effect?
Cisco Prime has been on the network performance monitoring market for over five years. Networking expert Andrew Froehlich takes a deeper dive into the Cisco network monitor, Prime.
Riverbed SteelCentral is one of the most prominent network performance monitoring systems on the market today. Networking expert Andrew Froehlich takes a deeper dive into its features.
While the KVM functionality in Red Hat Enterprise Linux can help admins manage VMs on a few servers, larger deployments may call for RHEV and OpenStack.
Why are most organizations not adopting full SDDCs yet? Find out what's blocking their road to an SDDC architecture and how some companies are overcoming those challenges.
For IT pros managing virtualized, bare-metal and containerized workloads in the data center, can hyper-converged infrastructure offer what's needed?
How to balance data safety with innovative big data expansion was at issue at an MIT symposium where the chief data officer role was considered.
DBAs can use the Dell Toad product suite for managing database structural performance and Dell Foglight to proactively monitor SQL, storage and virtualization performance.
SolarWinds provides DBAs and application teams with a database performance monitoring and analysis tool via a Java application that runs on a dedicated Windows, Unix or Linux server.