- Data Center Consolidation
- Data Center Construction
- Data Center Cooling
- Data Center Design
- Data Center Power Management
- Workload Automation
- Applications Management
- Blade Servers
- Call Center Management
- Contingency Planning
Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
See more topics related to: Data Center Consolidation | Applications Management | Blade Servers | Call Center Management | Contingency Planning | Data Centers | Data Recovery | Database Management | Help Desk Management | Host Management | Network Management | Security | SLA | Storage Management | Technical Support Staff
ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
The SIM Boston Technology Summit puts a spotlight on IT folks who can help make the business go. Also in Searchlight: Who will buy Twitter? Microsoft opens AI group.
Don't be like the white-haired bride and groom who put off the big event until they could afford it. Now is the time for action, says organizational agility expert Joseph Flahiff.
CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem.
The cure for a low-severity OpenSSL vulnerability proves worse than the disease, as it opened a new, critical flaw, forcing the OpenSSL Project to rush out a new set of patches.
In part two of his interview with SearchSecurity, MobileIron's James Plouffe talks about his role as a technical consultant on 'Mr. Robot' and how the show achieves its authenticity.
The FBI confirmed many state voter databases have been scanned or attacked by malicious actors and urged states to ensure security is in place and ready.
The latest IEEE Ethernet standard gets more life out of CAT5e and CAT6 cables by raising bandwidth from 1 Gbps to as much as 5 Gbps.
ICYMI: Talari survey studies the cost of network outages, ARM introduces a chip interconnect system and a study indicates that phishing attacks are taking aim at system files.
This week, bloggers look into ExtraHop continuous packet capture, Oracle's cloud computing goals and the breach at Yahoo.
A new batch of converged infrastructure looks to deliver many of its benefits to IT pros while still offering customization for specific workloads.
Moving servers off premises to a colocation facility can be a daunting task. Use these best practices to minimize downtime to ensure a seamless transition.
Virtual machines can now run on the edge, near the things at the center of the internet of things, making use of multiple applications outside the data center.
Users increasingly are eyeing the cloud for big data analytics applications, and IT vendors are moving to ease the process -- and the price -- of running Hadoop in the cloud.
Among a handful of new SQL-oriented, in-memory databases is MemSQL. Recent product updates are meant to improve data pipeline creation and performance in high-speed ingestion applications.
Expert John Ladley examines the leading data governance software products, comparing and contrasting their features to help you determine which tool will best meet your needs.