Operating systems, Open source, Windows, Software development, Mobile, Database, Business applications, SOA, Web software, Middleware, Business intelligence, Virtualisation, Collaboration, Software licensing, Financial applications, Cloud applications, CRM, ERP, HR software, AI and automation
Antivirus, IAM, Risk management, Data protection, Continuity, Cybercrime, Data Breach Incident Management and Recovery, Security policy and user awareness, Web Application Security, Cloud security , Compliance Regulation and Standard Requirements, Secure Coding and Application Programming, Network Security Management, Endpoint and NAC Protection
Network hardware, Network software, VoIP, Unified communications, Wireless, Mobile, Telecoms networks and broadband communications, Datacentre networking, Network routing and switching, Network monitoring and analysis, Network security strategy, WAN performance and optimisation, Software-defined networking, Internet of Things
Disaster recovery/security, Green IT, Datacentre backup power and power distribution, Datacentre cooling infrastructure, Systems management, Clustering for high availability and HPC, Performance, monitoring and optimisation, Datacentre capacity planning, Server and Operating Systems, Virtualisation, Desktop virtualisation platforms, SaaS, IaaS, PaaS
Disk systems, Backup, Virtualisation and storage, Storage switches, Cloud storage, Disaster recovery, Storage management, Compliance and storage, Flash and SSDs, Hyper-convergence, Software-defined storage
Learn how to protect your company's data, improve digital customer experience, manage workplace mobility, implement cloud computing and tackle big data challenges.Click Here
Learn how IBM's Smarter Computing will transform your IT environment by helping you successfully deploy and manage a cloud storage infrastructure and grow your business.Click here
ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
OpenStack turns 7 this year, but is it ready for prime time? Enterprise use has shown the open source cloud platform shines in some instances -- and falls short in others.
Our ninth annual IT Priorities Survey indicates data centers will address upgrades and infrastructure improvements and take on new and emerging technologies.
Alfred Essa from McGraw-Hill and Mike Gualtieri from Forrester on serving the customer of one at Spark Summit East.
A recent version of the iSpy keylogger has the ability to steal passwords and record Skype chats. Expert Nick Lewis explains how it works and how to protect your systems.
Google restructured its network security with the BeyondCorp program and wants to show other organizations how to move past firewalls.
SHA-1 deprecation in browsers comes as researchers create hash collisions and Google offers website and developer tools to protect against malicious uses.
Enterprise spending on public cloud service providers will increase almost 22% annually through 2020, depressing sales of data center switches from Cisco and other suppliers.
The single pane of glass, unified network management system is often thought to be a myth. But in the age of cloud computing, a viable framework is beginning to emerge.
Cisco has introduced hardware that contains all the components for running virtual network functions. The new gear delivers Cisco VNFs in the data center and branch office.
A converged system's appeal comes from having an optimized platform that removes significant complexity from an IT environment. But when is CI the right move to make?
Converged and hyper-converged systems simplify an IT environment and boost performance. Here's how to decide if they are right for your business's data center.
Cloud computing is built on the x86 processor, but don't forget RISC processors -- simple, yet powerful chips that still drive some of the data center's most important workloads.
Moving custom Spark and Hadoop pilot projects into production use has proved daunting. But container technology eased the transition at the Advisory Board analytics service.
Big data architectures are complicating the data integration process for more and more IT teams, driving them to hit the gas on efforts to expand their integration capabilities.
Effective metadata management processes can prevent analytics teams working in data lakes from creating inconsistencies that skew the results of big data analytics applications.